-
@ 3b7fc823:e194354f
2025-02-02 22:55:32The Secret to Staying Private in the Digital Wild West: A Guide to Using Encryption
You’re scrolling through social media, and suddenly you realize your phone’s been tracking your location and displaying it on your profile for months. You’re not even sure how that happened. Or maybe you’ve noticed that every time you shop online, the item you looked for follows you around with ads wherever you go. Sound familiar? Yeah, welcome to the digital world—where your data is basically a free buffet for anyone who knows how to ask.
But here’s the thing: you don’t have to sit back and take it. Encryption is like the secret weapon that lets you lock up your data and keep those prying eyes out. It’s not just for hackers or spies—it’s for regular people who want to take control of their privacy in a world that’s increasingly looking like a reality show where everyone’s a contestant.
What Is Encryption, and Why Should You Care?
Encryption is like a secure box that only you can open. When you use encryption, your data is scrambled in a way that’s hard for anyone else to read, even if they try. Think of it as putting on a metaphorical cloak that makes your online activity invisible to just about everyone except the people you want to see it.
For example, when you browse the internet, your connection is often not encrypted by default. That’s why websites start with “https” to indicate a secure connection—it’s saying, “Hey, we’re using encryption here!” Without that little green padlock, anyone on the same WiFi could potentially spy on what you’re doing.
So, encryption isn’t just for tech geeks or government agencies. It’s for everyone who wants to protect their data from being sold, stolen, or misused without their consent. And guess what? You’re already using it without realizing it. Every time you use a password-protected account or send an encrypted message, you’re reaping the benefits of encryption.
The Privacy Advantages of Encryption for Regular People
Let’s break down why encryption is your best friend when it comes to privacy:
-
Financial Transactions
When you pay online or use a banking app, encryption keeps your financial info safe from hackers. It ensures that only the banks and businesses you’re dealing with can access your money—no one else can. -
Online Accounts
Your email, social media, and other accounts often use encryption to protect your login details. That’s why you see those little “lock” icons when you’re logging in. Without encryption, someone could potentially intercept your password and gain unauthorized access to your account. -
Data Breaches
Encryption can often prevent data breaches from being useful. Even if hackers manage to steal your information, the encryption makes it unreadable, so the stolen data is basically worthless to the attackers. -
Location Data
If you’re worried about apps tracking your every move, encryption can help limit how much of that data is accessible. Some apps use encryption to protect location data, making it harder for companies to sell your movements without your consent. -
Privacy Protection
Encryption acts as a layer of protection against invasive technologies. For example, some apps use tracking software that follows you around the internet based on your browsing history. With encryption, these trackers can be blocked or limited, giving you more control over what information is collected about you.
How to Use Encryption Like a Pro
Now that you know why encryption is essential for privacy, let’s talk about how to use it effectively:
-
Use Strong Passwords
Encryption works only if your passwords are strong and unique. Don’t reuse passwords from one account to another, and avoid using easily guessable information like “password123” or your birth year. Use a password manager if you need help keeping track of them. -
Enable HTTPS Everywhere
Install browser extensions like HTTPS Everywhere to automatically encrypt your connections to websites that don’t support encryption by default. This ensures that even if you’re not actively thinking about it, your data is still protected. -
Look for the Lock Icon
Whenever you’re on a website or app, look for the lock icon in the URL bar. Make sure it’s encrypted before you input any personal information. -
Use Encrypted Communication Tools
For private conversations, use apps like Signal or SimpleX, which are designed with encryption in mind. These tools ensure that only the sender and recipient can read your messages, keeping them safe from prying eyes. -
Enable Two-Factor Authentication (2FA)
This isn’t exactly encryption, but it’s a close second. 2FA adds an extra layer of security by requiring you to provide two forms of verification—like your password and a code sent to your phone—to access your account. While not encryption itself, it works alongside encryption to keep your accounts secure. -
Use Encrypted Storage and Backup
When storing sensitive files or data, use encrypted cloud storage or external drives. Tools like BitLocker (for Windows) or AES-256 encryption can protect your files from unauthorized access. -
Stay Updated
Encryption technology is always evolving, so it’s important to keep your software and apps updated. Outdated systems are often easy targets for hackers, leaving you vulnerable to attacks.
Final Thoughts: Your Data Is Your Power
In a world where data is a commodity, encryption is your weapon against the invasive tactics of corporations and hackers alike. It empowers you to control what information you share and protects you from having it used against you. So, whether you’re shopping online, using your favorite apps, or just browsing the web, remember that encryption is there to help you stay private and in control of your own data.
And if you ever feel overwhelmed by all the privacy stuff, just remember this: you’re not alone. Millions of people are fighting for stronger privacy protections every day. So, do your part by using encryption wisely—your data and your privacy are worth it. Let’s make sure no one can take that away from you.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
-
@ 8d34bd24:414be32b
2025-02-02 21:31:11This Sunday our pastor had to give a sermon with very little preparation. He was leading an elders’ retreat and one of the elders was supposed to preach in his place. The elder who had prepared a sermon ended up in the hospital, so our pastor had to prep fast. He did a great thing. He preached on a passage, but also used that passage to demonstrate how he studies scripture. It was a great sermon. The passage he preached on reminded me of a time in my past when I learned some important lessons.
Almost 20 years ago, I was leading a high school girls Bible study. They picked out a book about Mary and Martha to study. Initially, I wasn’t thrilled with their choice, but didn’t have a theological problem with it, so I agreed for us to study this book. (I don’t remember the name of the book and all my books burnt up when my house burnt down almost 10 years ago). In the end, I probably got more out of the study than any of the girls because I have a definite tendency to be a Martha. What was Martha’s error? Let’s check out the passage:
Now as they went on their way, Jesus entered a village. And a woman named Martha welcomed him into her house. And she had a sister called Mary, who sat at the Lord’s feet and listened to his teaching. But Martha was distracted with much serving. And she went up to him and said, “Lord, do you not care that my sister has left me to serve alone? Tell her then to help me.” But the Lord answered her, “Martha, Martha, you are anxious and troubled about many things, but one thing is necessary. Mary has chosen the good portion, which will not be taken away from her.” (Luke 10:38-42 ESV)
Jesus visited two sisters who welcomed Him into their home. Mary sat at Jesus’s feet and listened to His teaching. Martha spent her time serving everyone and taking care of everyone’s physical needs.
Is taking care of their home and the needs of their guests a bad thing? Of course not, but is it the best?
To make things much worse, Martha then got upset because her sister Mary wasn’t helping her. She was just sitting there taking in every word that Jesus said. Most of us would think Martha’s sacrifices to take care of everyone was better than Mary’s choice to just sit at Jesus’s feet, but did Martha really choose the better path?
Martha then showed that her heart wasn’t focused right and she wasn’t putting the most important things first. She complained to Jesus about her sister’s failure to help and even commanded her Creator, “Tell her then to help me.” Instead of focusing on the words of Jesus, her frustration led her to command her God to act in the way she desired. She was so busy with cooking, cleaning, and serving, that she missed the most important things — spending time with and listening to her God, who was right there in her house with her. This was an opportunity that shouldn’t be missed due to busyness.
How often do we all do this same thing? How often are busy doing good things and miss the most important things? How often are we busy doing ministry that we forget about the reason for the ministry? I don’t know about you, but this happens to me a lot more often than I would like to admit. My biggest sins are usually not what most people think of as sins. My biggest sins are getting so busy that I leave God out of my life. I am so busy serving God that I forget to follow His leading. I am so busy doing what most people would consider good things, but if God is not part of them, they are not worth much. Because I am focusing on getting things done, worry and stress overtake me harming my health and my relationship with Jesus.
I don’t think this is taking Scripture out of context:
We have come to know and have believed the love which God has for us. God is love, and the one who abides in love abides in God, and God abides in him. (1 John 4:16) {emphasis mine}
Knowing that God is love, read the following passage replacing love with God.
If I speak with the tongues of men and of angels, but do not have love, I have become a noisy gong or a clanging cymbal. If I have the gift of prophecy, and know all mysteries and all knowledge; and if I have all faith, so as to remove mountains, but do not have love, I am nothing. And if I give all my possessions to feed the poor, and if I surrender my body to be burned, but do not have love, it profits me nothing. (1 Corinthians 13:1-3)
If I do not include God in my every action, “it profits me nothing.”
In reality it shouldn’t be allowing God to join me in my works, but me joining God in His works. It should be me listening to God’s word and the leading of the Holy Spirit, looking and seeing what God is doing around me, and me joining in His great works. It should be me allowing God to use me as a tool.
There are times that God speaks clearly and directly to us about what He desires for our lives, but most of the time, He speaks through His word — the Bible. Knowing the Bible helps us to know His will and His eternal plan, so we can follow Him and join Him in His work. Knowing the Bible helps us to differentiate between what is good and what is God’s best. It helps us to prioritize what is really important.
And this I pray, that your love may abound still more and more in real knowledge and all discernment, so that you may approve the things that are excellent, in order to be sincere and blameless until the day of Christ; having been filled with the fruit of righteousness which comes through Jesus Christ, to the glory and praise of God. (Philippians 1:9-11) {emphasis mine}
We can’t obey God, imitate Christ, or follow Him if we refuse to listen and that means spending time in the Bible and time in prayer with Him.
“Listen to Me, you stubborn-minded, Who are far from righteousness.” (Isaiah 46:12)
Come, you children, listen to me; I will teach you the fear of the Lord . (Psalm 34:11)
“Now therefore, O sons, listen to me, For blessed are they who keep my ways. (Proverbs 8:32)
But seek first His kingdom and His righteousness, and all these things will be added to you. (Matthew 6:33)
Our focus on Jesus/God must go beyond knowing Him. It is equally important to obey.
And He [Jesus] said to another, “Follow Me.” But he said, “Lord, permit me first to go and bury my father.” But He said to him, “Allow the dead to bury their own dead; but as for you, go and proclaim everywhere the kingdom of God.” (Luke 9:59-60) [clarification mine]
Once we know what He wants from us, we need to instantly drop what we are doing and follow Him. We can’t put other things ahead of obeying God.
For amazement had seized him and all his companions because of the catch of fish which they had taken; and so also were James and John, sons of Zebedee, who were partners with Simon. And Jesus said to Simon, “Do not fear, from now on you will be catching men.” When they had brought their boats to land, they left everything and followed Him. (Luke 5:9-11) {emphasis mine}
We should be like these apostles, that, after their most successful catch of fish in their entire career as fishermen, “they left everything and followed Him.” We need to let go of what we think is important and obey Him. We need to change our priorities to match God’s priorities.
That may mean we change careers to one that allows more free time for ministry or even going into full time ministry. It may mean letting go on keeping the perfect, clean house, so there is time for ministry, Bible study, or discipling our kids. It may mean changing your habits from watching TV with your family to reading the Bible with your family. For each of us, it will look different, but we need to be like Mary and choose to sit “at the Lord’s feet and listened to his teaching.” We need to be like the apostles who “left everything and followed Him.” We need to choose to put Jesus’s plans before our own. We need to choose to make God’s values our values.
But this is what I commanded them, saying, ‘Obey My voice, and I will be your God, and you will be My people; and you will walk in all the way which I command you, that it may be well with you.’ (Jeremiah 7:23)
Like so many things, it is simple, but it isn’t necessarily easy. We have to change the way we think in order to obey faithfully.
If anyone serves Me, he must follow Me; and where I am, there My servant will be also; if anyone serves Me, the Father will honor him. (John 12:26)
We have to change our priorities to God’s priorities.
Then Jesus said to His disciples, “If anyone wishes to come after Me, he must deny himself, and take up his cross and follow Me. (Matthew 16:24)
We need to seek God, His word, and His presence.
As the deer pants for the water brooks,\ So my soul pants for You, O God.\ My soul thirsts for God, for the living God;\ When shall I come and appear before God? (Psalm 42:1-2)
We need to be in God’s word daily, so we know who God is and what He desires from us.
How can a young man keep his way pure?\ By keeping it according to Your word.\ With all my heart I have sought You;\ Do not let me wander from Your commandments.\ *Your word I have treasured in my heart*,\ That I may not sin against You.\ Blessed are You, O Lord;\ Teach me Your statutes.\ With my lips I have told of\ All the ordinances of Your mouth.\ I have rejoiced in the way of Your testimonies,\ As much as in all riches.\ *I will meditate on Your precepts*\ And regard Your ways.\ I shall delight in Your statutes;\ I shall not forget Your word. (Psalm 119:9-16) {emphasis mine}
We need to read the Bible cover to cover so we know the whole word of God. Once we have read through the Bible multiple times, we need to spend time studying the Bible in more depth, so we can know the details, see how the different parts relate to each other, and grow in our knowledge of God. We need to study the Bible and use this knowledge to guide every decision in life — big and small.
Yet they did not listen or incline their ears, but stiffened their necks in order not to listen or take correction. (Jeremiah 17:23)
Just reading the Bible or sitting in church listening to sermons will not make a difference if we don’t truly listen and internalize God’s word, so we can apply it in our every day life. God knows what is best for us and we will never be truly at peace or have true joy until we are living our lives in the light of God’s word and direction.
My prayer for you and for me is that we will have the heart of Mary rather than the heart of Martha and that we will faithfully seek and follow God all of the days of our lives.
Trust Jesus.
-
@ 5a261a61:2ebd4480
2025-02-02 20:42:37Let’s be real—sticking to anything for 90 days is like trying to herd cats on espresso. You start strong, then life happens: kids, chores, or that one glass of wine that makes you forget foot rubs (#relatable). But here’s the thing: 90-day challenges aren’t about perfection. They’re about bribing your lizard brain with rewards and scaring it straight with punishments.
The Game Plan
First, pick a thing—something that makes you feel like a devoted servant or a slightly frazzled superhero. Daily foot care? Chores with a side of #FLR flair? Cool. Now, break it into chunks: 30 days (survival mode), 60 days (grind phase), and 90 days (victory lap).
Keeping up something for so long is no joke. That's why you need those little checkpoints along the way. Each milestone should feel special—30 days deserves celebration, 60 days something more meaningful, and 90 days? That's your victory dance moment.
Reality check: some days will suck, and you'll want to skip. That's where having everything planned out helps. When your brain is foggy and you're tired, you don't want to be negotiating with yourself about what counts and what doesn't. The hardest part isn't even doing the thing—it's remembering to do it every single day, until it feels wrong NOT to do it.
Why It (Maybe) Works
Three months is long enough for habits to stick, short enough to see the finish line. Plus, tying it to power exchange? Genius. Every foot rub or denied cum becomes a ritual, proof you're leveling up as a sub/human/slightly-messy adult. And let's be honest—nothing fuels devotion like a mix of structure, desperation, and the occasional humiliating punishment.
Current run
My current challenge is to get my wife/godess/object of my insatiable kinky thoughts/partner feet massaged with special cream. It's for making evyrthing soft, help nails and yadayadayada. Basically preping her feet for more instensive worshiping. She doesn't know my hidden agenda and I am not sure if I would really be into it, since I am more into being her devout toy than having foot fetish, but I think it will be all the same if I put myself juuust right. So for my rewards I have planned these? - 30 days: Tiny dopamine hit. (making little photoset of Her feet playing with my hardon… for science.)
- 60 days: Mid-tier flex. (cleaning mushed banana split off Her toes tongue only)
- 90 days: Go nuclear. (a tiny foot spa whirpool because She deserves it, damn it :D and it will create more opportunities for... you know )As for the hhip part of the sugar duo... It was easy having one for my shaving rutine, but here? Not sure and it's bad that I ave started challenge without having them prepared... May be that warrant more punishment?
TL;DR
90-day challenges are the BDSM of self-improvement: consensual, slightly painful, and weirdly addictive. Fail? Reset, adapt, try again. Win? Congrats, you’re now 10% more disciplined and 100% more bumptious on Nostr.
90days #FLR #LostCauseButStillTrying #femdom
-
@ 378562cd:a6fc6773
2025-02-02 18:58:38Chef's notes
I'm only testing this out right now. I will update the recipe as well as add my own image soon after making this dish again.
Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
Ingredients
- 4 to 6 potatoes (size depending)
- 1 lb ground beef
- seasonings
- 2 cans chili beans
- 1 onion
- katsup
- shredded cheese of some kind
Directions
- saute onion and add ground beef to skillet. Season to liking.
- peel if you like and thin slice potatoes
- in a rectangle baking dish, layer potatoes, beans, meat and cheese (like a lasagna) until you have used all your ingredients. Try and make at least 2 or 3 layers with extra cheese on top.
- Bake at 350 for one hour. Serve and enjoy!
-
@ 07f367da:0e76880d
2025-02-02 18:18:51운동사회에서 전장연 하면 일단 묻고 따지지도 않고 지지하는 분위기(?)이지 않나 싶은데. 전장연이 운동단체지만 나쁜짓도 함.
장애인활동지원사는 재직노동자 88%가 여성인 젠더화된 돌봄노동. 활동지원서비스 제공기관 중 하나인 A센터라는 사업장은 최근 근로기준법 위반으로 소장이 유죄판결이 내려졌고, B센터의 경우 체불임금이 있어서 재심사에서 탈락 된 것으로 추정되는 사업장.
여기서 중요한건 이 두 센터 모두 자신들이 잘못했다고 반성하는게 아니라, 자신들의 운동자원을 잘못을 덮기위한 정치적 자원으로 사용한다는 점임.
A센터는 전장연 사무총장 10년 역임한 원로활동가가 소장으로 있는 사업장. 분쟁의 시작은 관공서공휴일유급휴일수당을 지급하지 않기 위한 취업규칙 개정이었음.
노동자들이 소장이랑 말이 안통해서 법률적 대응을 하려고 공익인권법재단 공감 변호사를 통해서 소송 제기했음. 취업규칙변경무효확인의소. 그런데 한국장애인자립생활센터협의회, 장애인차별금지추진연대 활동가가 이건 공익사건이 아니라며 사건 수임하지 말라고 공익변호사한테 찾아감.
공감은 회의에서 주장을 검토했고 수임 계속하기로 결정했음. 한자협과 장추련은 이 관련 건에서 사실 이해관계가 얽혀 있음. 한자협은 장애인자립생활센터들의 연합체 연대체라고 할 수 있겠는데, 그 단체의 성격이 사용자단체라고 할 수 있음.
장애인차별금지추진연대는 단체 이름으로는 그냥 장애인 인권단체이지만, 자립생활센터들로부터 후원을 받음. A센터 회계에서도 활동지원사업 수익금 일부가 장추련으로 흘러 들어갔음.
한자협과 장추련은 관련 소송 첫 공판 있는날 기자회견을 함. 기자회견 요지는 장애인학대사건 등 자정 노력 없는 노조가 노동조건만 요구한다며 규탄하는 기자회견 진행함. 그런데 소송원고 중에 학대범죄 저지른 사람이 있다면, 활동지원사로 계속 재직할 수 있을리가 없음. 전형적인 낙인찍기.
인권단체지만 노동자들은 인간취급 안함. 장추련 변호사들이 붙어서 A센터 지원. 재판결과는 원고일부 승. 취업규칙개정 일부무효를 확인하고 수당을 지급하라는 판결이 내려짐.
A센터 임금체불관련 다른 소송에서는 한자협은 회원기관들에게 연서명을 돌림. 민사소송이었는데 공문 내려서 연서명 받음. 근로기준법 위반 사업장 정당화 하려고 집단연서명 받은거임. 하지만 체불임금 주라고 법원에서 판결 나옴. 항소해서 2심 재판중.
이제 B센터 이야기 해보자. B센터는 장애여성의 소수자성을 내세우는 센터의 부설 자립생활센터였음.
서울시에서 서울시복지재단에 연구를 시켜보니 활동지원사업장 근로기준법위반이 너무 만연함. 법정 임금을 미지급함.
이를 시정하기 위해서 재지정심사 관련 지침을 기초자치구에 내리는 절차를 진행함. 활동지원사에게 임금체불 있으면 재지정심사에서 탈락시키는걸 골자로 함. 처음 하는 거다 보니 사업장들 반발이 심해서. 관련 기준 마련하는 회의도 몇차례 함.
심사해서 임금체불 있는거 발견되면 활동지원 사업장에 알려서 시정할 기회도 주기로 함. 과거 내용은 못하겠고 발표한 시점(2024년)만 보겠다고 함. 그런데 B센터 탈락함. 이런 내용을 B센터가 몰랐느냐? 그럴리가 없음. 한자협에서 심사기준 마련하는 회의에도 들어왔고 내용 다 알고 있었음.
B센터는 아주 높은 확률로 임금체불이 있었던 근로기준법 위반 사업장임. 그런데 심사 떨어지니. 오세훈의 탄압이라고 프레이밍함. 강동구청 앞에서 기자회견 하고, 운동사회 출판물에 탄압받는 자립생활센터라며 기고도 함.
전장연은 대정부 투쟁을 통해서 예산을 확보함. 그리고 진보적 장애인 운동의 물적 토대를 확보하는! 한자협은 정부의 사업을 수탁함.
사업을 통해서 자금을 확보하고 이를 운동에 사용하는 것은 좋은일임. 하지만 근로기준법도 안지키고 노동자들 착취하면서, 무엇보다 잘못을 인정하지 않고 이를 정당화하는 활동을 진행하는 것은 올바르지 않음. 이런 활동에 전장연의 연대의 힘이 작용하고 있음.
전장연은 적어도 여성돌봄노동자들의 노동권에 있어서는 인식에 문제가 심각하고 이 사안에 있어서는 비판적으로 바라볼 필요가 있음. 묻지도 따지지도 않고 연대할 대상이 아님.
-
@ 378562cd:a6fc6773
2025-02-02 17:53:05Chef's notes
I'm only testing this out right now. I will update the recipe as well as add my own image soon after making this dish again.
Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
Ingredients
- 4 to 6 potatoes (size depending)
- 1 lb ground beef
- seasonings
- 2 cans chili beans
- 1 onion
- katsup
- shredded cheese of some kind
Directions
- saute onion and add ground beef to skillet. Season to liking.
- peel if you like and thin slice potatoes
- in a rectangle baking dish, layer potatoes, beans, meat and cheese (like a lasagna) until you have used all your ingredients. Try and make at least 2 or 3 layers with extra cheese on top.
- Bake at 350 for one hour. Serve and enjoy!
-
@ d57360cb:4fe7d935
2025-02-02 16:33:16Beauty and art function beyond the mind.
When you’re not thinking, when the mind reaches its natural silence. When it quiets down.
You begin to experience and actually experience how things are.
There is no more narration. Things happen as if by magic. Everything is in its place happening and grooving.
Every act, every movement feels like jazz.
We’re better doers than we are thinkers. But the world thinks otherwise.
-
@ 6b57533f:eaa341f5
2025-02-02 15:46:41🏝️lost in the ordinary?
Welcome to Stories
Discover a hidden paradise where the world slows down, and adventure begins..
🌊 Step into tranquility.
Wake up to the sound of gentle waves and endless blue horizons.
🛶Live the dream.
Unwind, explore, and escape—your perfect getaway is just one step away.
-
@ 5d4b6c8d:8a1c1ee3
2025-02-02 14:47:05A little better today
I'm about to have some coffee, after 14 hours not eating or drinking . I probably won't eat for a couple more hours, either.
I forgot to mention another element of Fast February: the "fiscal fast". Some of you may have heard this term before. It's exactly what it sounds like: stop spending money. In my case it just means not buying anything specifically for myself: no snacks, no takeout, no video games, etc.
originally posted at https://stacker.news/items/873395
-
@ 3b7fc823:e194354f
2025-02-02 13:39:49Why You Should Only Run DeepSeek Locally: A Privacy Perspective and how to
In an era where AI tools promise immense utility, the decision to run DeepSeek locally is not merely about functionality but also about safeguarding privacy and security. Here's the rationale why:
-
Control Over Data Access: Running DeepSeek locally ensures that data processing occurs on your own machine or server, allowing you to have full control over who can access the system. This reduces the risk of unauthorized access and misuse.
-
Data Privacy: By keeping computations local, you ensure that personal data does not leave your control, minimizing the risk of exposure through cloud-based services.
-
Security Measures: Local operation provides an additional layer of security. You can implement access controls, monitor usage, and respond to incidents more effectively, which might be harder or impossible when relying on third-party platforms.
-
Practical Implementation: Tools like Ollama and OpenWebUI facilitate setting up a local environment, making it accessible even for those with limited technical expertise. This setup empowers individuals to leverage AI capabilities while maintaining privacy.
-
Right to Control Data: Privacy is a fundamental right, and running DeepSeek locally respects this by allowing users to decide what data they share and how it's accessed. This empowers individuals to make informed choices about their personal data.
For those prioritizing privacy, this approach is not just beneficial—it's essential.
Running DeepSeek Locally: A Guide for Individual Home Users
DeepSeek is a powerful AI search engine that can help with various tasks, but running it locally gives you greater control over your data and privacy. Here’s how you can set it up at home.
What You’ll Need
- A Computer: A desktop or laptop with sufficient processing power (at least 4GB RAM).
- Python and pip: To install and run DeepSeek.
- Ollama: An open-source tool that allows you to run AI models locally.
- OpenWebUI: A simple web interface for interacting with Ollama.
Step-by-Step Guide
1. Install the Prerequisites
- Python: Download and install Python from https://www.python.org.
- pip: Use pip to install Python packages.
bash pip install --upgrade pip
- Ollama:
bash pip install ollama
- OpenWebUI: Visit https://github.com/DeepSeek-LLM/openwebui and follow the instructions to install it.
2. Set Up Ollama
- Clone the official Ollama repository:
bash git clone https://github.com/OllamaAI/Ollama.git cd Ollama
- Follow the installation guide on https://ollama.ai to set it up.
3. Run DeepSeek Locally
- Use OpenWebUI as your interface:
bash # Start OpenWebUI (open a terminal and run this): python openwebui.py --model deepseek-llm-v0.2-beta
- A web browser will open, allowing you to interact with DeepSeek.
Tips for Optimization
- Reduce Memory Usage: Use smaller models like
deepseek-llm-v0.2-beta
if your computer has limited resources. - Limit Model Access: Only allow authorized users to access the system by restricting IP addresses or using a VPN.
- Regular Updates: Keep all software up to date to protect against vulnerabilities.
Why Run DeepSeek Locally?
- Privacy: Your data stays on your local machine, reducing the risk of unauthorized access.
- Flexability: Running locally allows you to build specific models for specific uses and provide them with RAG data.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
-
-
@ fbf0e434:e1be6a39
2025-02-02 13:32:12本文原载于《CERN Courier》,是由欧洲核子研究中心(CERN,全称Conseil Européen pour la Recherche Nucléaire)出版的权威科学期刊,专注于报道全球物理学、技术及创新领域的前沿动态。以下正文内容是对全球开源开发者激励平台DoraHacks的创始人张剑南的专访报道,探讨了黑客松如何成为科技创新的重要推动力以及DoraHacks在其中扮演的角色。
万维网(World Wide Web)、人工智能(Artificial Intelligence)与量子计算(Quantum Computing)——这些划时代的技术有何共同之处?DoraHacks创始人张剑南认为,它们都源于“Hacks(黑客精神)”。“当万维网在欧洲核子研究中心(CERN)诞生时,它向我们证明了一件事:要想改变并提高人类的生活方式和工作效率,关键在于以创新的思维利用现有的技术以实现突破。”张剑南解释道,“如果总是从零开始,我们永远无法取得实质性的进步。这恰恰就是开源运动和黑客马拉松的核心价值。”
十年前,张剑南参与筹办了CERN Webfest 2013,这是一场致力于探索如何以创新方式运用技术来服务科学与社会的黑客马拉松活动。通过Webfest,张剑南不仅实现了编程技能与物理学知识的跨学科融合,还与来自世界各地、背景各异的hackers建立了持久深厚的联系。随着参与黑客松次数的增多,他的“黑客精神”愈发强烈,最终驱使他创立了自己的公司。2024年,张剑南重返Webfest,但这次他不再是参与者,而是作为DoraHacks的首席执行官来见证这场盛会。
黑客马拉松是一种持续数天的社交编程活动,具有高度的包容性和开放性——参与者无需学术机构或企业背景即可加入。这种特性吸引了众多才华横溢的个体参与其中。活动中,hackers以团队形式合作,结合各自的技能,通过软件、硬件或商业计划等来解决技术难题。这不仅让物理学家、计算机科学家、工程师和企业家齐聚一堂,各展所长,也让年轻的开发者们有机会突破传统研究框架,提升技能、积累作品集,并拓展职业人脉。
“如果你对某件事充满热情,就应该能够立即投入其中并全力以赴,”张剑南强调,“追求梦想并不需要特定的学历或背景。”
对于在某个领域刚起步的研究者来说,黑客松的意义远不止于技术挑战。它为进入一个研究或行业领域提供了另一种途径,弥合了学术理论与实际应用之间的鸿沟。很多由大学举办的黑客松往往能够吸引到企业的赞助,这些赞助除了作为奖金来激励开发者持续开发,也会用来租赁大型场馆,以容纳数百甚至上千名参与者。
“正是这些大规模的黑客松吸引了众多行业猎头和导师的关注,”张剑南解释道,“他们把这类活动看作他们的人才库。通过黑客松,参与者们能够与大公司的人直接交流,加速职业发展,同时也能在实践中提升他们的编程能力。”
在2010年代,张剑南经常在周末参加黑客松,这也成为他创业的基石。“我曾经坐在计算机科学学院的公共休息室里,埋头研究我的黑客项目。我的大多数朋友也是在那里认识的,”张剑南回忆道,“但后来我意识到,如果想做出真正伟大的东西,必须有效地组织人力与资金。然后我就开始‘逃课’,不去上计算机系的课程,而是偷偷溜进商学院的教室里。”张剑南常常在商学院的教室后排听课,一边听课一边谋划自己的创业计划。他每天都与同行交流,评估各种不同的商业模式。“在创业过程中,要把工程知识与商业理论结合起来思考,”他补充道,“这是比较有趣的一点,让整个过程也轻松了一些。”
然而,从科学研究转向创业并非易事。“创业初期必须亲力亲为,要自己去学习然后完成各种任务。”张剑南坦言,“好处是能够接触到许多新技能和新朋友,但同时也得强迫自己去做那些原本不擅长的事情。”
这种经历也反映了许多创业者的共同困境:选择自己从头学习新技能,还是寻找合适的创业伙伴然后把任务分配出去?可是找到值得信赖的合作伙伴也不是一件容易的事,错误的决策甚至可能阻碍公司的发展。因此,从一开始就明确公司的愿景和使命显得尤为重要。
“解决方案其实很简单,”张剑南表示,“重点是要投入足够多的时间,亲自完成关键里程碑,以确保产品真正具备可行性。只要有了明确的商业计划和愿景,就能获得来自各方的支持。”
去中心化的社区治理
很多黑客马拉松参与者在活动结束后就会放弃自己的项目,但张剑南创立DoraHacks的初衷并非如此。他希望为全球的黑客团队提供一个平台,让他们能够将创意转化为成熟产品。“我希望黑客马拉松不仅仅是一个招聘工具,”他解释道,“它更应该推动开源开发和去中心化的社区治理。比如现在,来自坦桑尼亚的黑客可以与美国的黑客团队远程协作,然后获得持续的支持,以开发出真正有影响力的产品。这种模式让技术领域变得更多样化,同时也能够让更多人接触到不同的领域。”
DoraHacks通过帮助组织者降低后勤成本,为参与者提供更可靠的资金支持机制,使黑客松超越学术机构的限制,吸引更多对创新充满热情的个体研究者参与。然后不断发展整个社区,让年轻一代的开发者、研究者们能够在自己的职业初期,接触到比以往更多的机遇和机会。
“商业模式正在发生根本的变化,”张剑南指出,黑客马拉松正在发展成为新兴技术的基石,尤其是在量子计算、区块链和人工智能等以开源形式起步的领域。“产品创造的过程将会迎来重大变革。未来的技术发展不再依赖于孤立封闭的产品开发,而是基于黑客们可以共同贡献的平台和基础设施。”
如今,黑客马拉松的意义已不仅限于编程或建立人脉——它们更关乎突破技术边界、创造有意义的解决方案,并开辟新的职业道路。黑客马拉松是创意孵化器,并且能够对这些创意产生持久的影响力。张剑南希望帮助这些创意变为现实。“未来创新的方式一定是协作完成的,是开源的,”他再次强调,“在传统社会环境里,企业的发展依赖于在闭源技术周围筑起的护城河,这种技术更新方式的效率低下且不容易实现。而真正创新的未来,将以开放平台技术为核心,让全球开发者能够在现有项目的基础上不断迭代更新。这样的开放协作精神正是Hacker Movement(开源极客运动)如此重要的原因。”
采访者:Alex Epshtein(编辑助理)。 原文链接:https://cerncourier.com/wp-content/uploads/2025/01/CERNCourier2025JanFeb-digitaledition.pdf
-
@ ddf03aca:5cb3bbbe
2025-02-02 13:09:27We’re thrilled to announce the stable release of Cashu-TS v2.2! Although this update is a minor version bump, it brings significant improvements under the hood that enhance the overall developer experience. We’ve spent several weeks testing and refining these changes.
What’s New in v2.2?
While there are no breaking changes in this release, there are many internal changes. If you spot any regressions or unexpected behavior, please let us know. Here’s a rundown of the major updates:
- Enhanced Proof Creation: The way proofs are created internally has been revamped.
- User-Controlled Outputs: You now have full control over how outputs are created.
- Improved Bundling: We’ve switched our bundling tool to vite for faster and more modern builds.
- Updated Testing Tools: Our testing framework has migrated to vitest and msw, with added browser testing via Playwright.
New Flexibility with OutputData
In previous versions of Cashu-TS, the creation of outputs (or BlindedMessages) was hidden away. Even though there were options to tweak the process (like deterministic secrets or P2PK), you were always limited to the built-in logic.
What’s Changed?
In v2.2, we’ve introduced a public interface that not only streamlines output creation but also lets you plug in your own custom logic when needed. With the new
outputData
option available on all output-creating methods, you can now bypass the automatic process and provide your own outputs.For example, you can create two proofs tied to different public keys in a single mint operation:
ts const data1 = OutputData.createP2PKData({ pubkey: "key1" }, 10, keys); const data2 = OutputData.createP2PKData({ pubkey: "key2" }, 10, keys); const { keep, send } = await wallet.send(20, proofs, { outputData: { send: [...data1, ...data2] }, });
Customization Made Easy
The
outputData
option now accepts anything that conforms to theOutputDataLike
interface. This means you can introduce your own output creation logic—even if it’s not natively supported by Cashu-TS yet. Here’s what the interface looks like:```ts export interface OutputDataLike { blindedMessage: SerializedBlindedMessage; blindingFactor: bigint; secret: Uint8Array;
toProof: (signature: SerializedBlindedSignature, keyset: MintKeys) => Proof; } ```
Introducing OutputData Factories
While having full control is empowering, it also means you’ll need to handle tasks like fee calculation and amount selection manually. To strike a balance between control and convenience, we now support OutputData Factories.
A factory is simply a function that takes an amount and
MintKeys
as input and returns anOutputDataLike
object. This way, you can define a blueprint for your output data without worrying about the nitty-gritty details. For instance, you can create separate factories for amounts you keep versus those you send:```ts function keepFactory(a: number, k: MintKeys) { return OutputData.createSingleP2PKData({ pubkey: "keepPk" }, a, k.id); }
function sendFactory(a: number, k: MintKeys) { return OutputData.createSingleP2PKData({ pubkey: "sendPk" }, a, k.id); }
const { send, keep } = await wallet.send(amount, proofs, { outputData: { send: createFactory("send"), keep: createFactory("keep") }, }); ```
Plus, you can now instantiate a
CashuWallet
with a defaultkeepFactory
, ensuring that all change amounts automatically lock to your key—streamlining your workflow even further.
Bundling Improvements with Vite
Starting with v2.2, we’ve transitioned from using
tsc
to vite for transpiling and bundling the library code. Although this change is mostly behind the scenes, it brings several benefits:- Modern Build Target: We’ve updated our build target to ES6.
- Updated Exports: The package exports now reflect the latest JavaScript standards.
- Standalone Build Soon: We’re working on a standalone build that bundles Cashu-TS along with all its dependencies. This will let you import Cashu-TS directly into your HTML.
If you encounter any issues with the new bundling setup, please let us know.
A Nod to Vitest
In addition to our bundling improvements, we’ve migrated our testing framework from Jest (with nock) to vitest combined with msw. This switch gives us more flexibility in testing and mocking, plus we’ve added browser testing based on Playwright—thanks to the tip from nostr:npub16anjdksmvn5x08vtden04n64rw5k7fsjmedpw8avsx8wsh8ruhlq076pfx!
In Conclusion
Although Cashu-TS v2.2 is a minor version update, it comes packed with improvements that enhance both the developer experience and the flexibility of the library. We’re excited to see how you’ll use these new features in your projects! Thanks to all the amazing contributors that add to this library.
Thank you for being a part of the Cashu-TS community. As always, if you have any questions, suggestions, or issues, don’t hesitate to reach out to us.
-
@ c11cf5f8:4928464d
2025-02-02 13:05:25Let's hear some of your latest #Bitcoin purchases, feel free to include links to the #shops or #merchants you bought from too. Any good #deal we should know about?
If you missed our last thread, here are some of the items stackers recently spent and #zap #sats on.
originally posted at https://stacker.news/items/873304
-
@ 0463223a:3b14d673
2025-02-02 12:22:46I’m totally wasted! I don’t mean off my head on drugs, I mean absolutely physically and mentally exhausted.
Lugging heavy PA equipment up and down stairs, plus mixing shows is a lot and at my age I’m struggling with it. Yesterday was a write off due to exhaustion. My wife and I went to the cinema, and I slept through the film. A shame, it was something I wanted to see but I was toast. I went to bed at 8pm and slept for over 12 hours. I still feel wrecked today.
Live sound was always a sort of plan B. For a number of years teaching and performing with a band or a DJ was enough to get by on. I was comfortable, financially speaking. That was until about between 2012-14, that’s when we really felt the effects of the post 2008 crash. While a lot of noise was made about the initial event, reality for the likes of me was a slow and steady decline. At that time I was leading workshops with kids with difficult backgrounds, many kids in care due to abuse and neglect. That was a solid 40% of my income, another 30% came from teaching Sound Production at a local university and the final 30% from shows.
2014 cutbacks ripped services to shreds and a few friends lost jobs. Since then, doing live sound kept the rent and bills paid but fast forward to 2025 and I’m way too tired for this shit! I hate admitting it but my earnings probably peaked around 2008 with a bump in tours from 2017 till Covid. Since then earnings have been steady in £'s but getting wiped out by inflation. In fact I had decent acounts this year but every month I'm broke by the time bills and basics have been taken care of. I LOVE mixing live music and I’m pretty good at it. I’ve had musicians call me ‘musical’ which is the highest compliment but I’m totally fucked still 2 days after Friday’s show. It's unsustainable.
I’m quitting live sound unless some touring comes up again, touring is different, living on a bus for 3 weeks pays the same as 3 months of local work and I just mix, no lifting gear. The band I tour with are based in the US and only come to the UK/EU every couple of years. I get odd trips away with other artists but they’re usually fly out EU gigs. 1 or 2 shows then fly home, plus they're irregular.
Right now I’m more interested to learn ways of making income online, I started the Kali Mera Show to learn self hosting content. Committing to a project each morning has done wonders for my mental health, cutting down on morning doom scrolling. It’s been highly successful in that regard but not so much financially. However this is jst phase 1. I’m learning the tech, learning the production and making as many mistakes as possible while the stakes are low. I’m very happy 10 or so people enjoy the show on a daily basis. Tiny numbers but I don’t fuck with YouTube or the other big tech platforms. Fuck them!
Phase 2 involves getting premises and broadening the services I can produce, focussing on content for others, getting some opportunities happening for young talent, arranging meet ups and setting up a hub to bring together the crazy, talented people I know. It’s going to be tough, I’m in a run down area, there’s not much money here (relatively speaking) but it’s an area I really dig and want to make better.
Why am I telling you this? I’m writing this as a means of getting my brain straight and sharing it because I’m open to improving myself. I see people doing interesting shit here and that helps with motivation and confidence. My only social media for the last 6 years has been the Fediverse and much as I love it, there’s a gloomier outlook there. The world is a strange place with so much bad shit but out of 8 or so billion people, I can only take on so much. Building shit in my own local community and provide facilities for online wins sounds way more productive and helpful in some small way.
I accept we’re all going to hell in a handcart but may as well enjoy the ride…
There’s much to learn, I’ve only ever been ‘in business’ for a short time in my life (despite always being freelance) and I sort of gave up on my previous attempt. Had I paid more attention I could’ve built a strong YouTube presence but I’m not into being a vehicle for companies to push their products, nor do I want to teach people music online. That market is now heavily saturated and very, very boring as far as I’m concerned. My heart wasn’t in it, even back in 2015. I’m not an influencer.
With a real life space there’s premises, business rates, and investors to consider, as well as developing services that people are actually happy to part cash with. It’s going to be hard but different hard to physically lifting sub-bass speakers up and down winding staircases! I don’t want to talk too much game, it’s results that matter but wasting days to exhaustion doesn’t help. It’s time to hang up my headphones and focus (FOCUS YOU FUCKING FUCK!).
Maybe you’re reading this and thought ‘shit, this guy’s totally deluded’. That’s cool. Tell me. I value feedback. A fair few cats here give life advice so I’ll assume you might know what you’re talking about...
-
@ fd208ee8:0fd927c1
2025-02-02 10:33:19GitCitadel Development Operations
We, at GitCitadel, have been updating, moving, and rearranging our servers, for quite some time. As a rather large, complex, sprawling project, we have the infrastructure setup to match, so we've decided to give you all a quick run-down of what we are doing behind-the-scenes.
Supplier Coordination
Our first task, this week, was figuring out who would host what where. We have four different locations, where our infra is stored and managed, including two locations from our suppliers. We got that straightened out, quickly, and it's all slowly coming together and being connected and networked. Exciting to watch our DevOps landscape evolve and all of the knowledge-transfer that the interactions provide.
OneDev Implementation
Our biggest internal infra project this week was the migration of all of our issues from Jira, build scripts from Jenkins, and repos from GitHub to a self-hosted OneDev instance. In the future, all of our internal build, test, issue, patch/PR, etc. effort will take place there. We also have a separate repo there for communicating with external developers and suppliers.
Our team's GitHub projects will be demoted to mirrors and a place for external devs to PR to. Public issues and patches will continue to be managed over our self-hosted GitWorkshop instance.
We're especially glad to finally escape the GitHub Gulag, and avoid being bled dry by Jira fees, without having to give up the important features that we've come to know and love. So, yay!
Next Infrasteps
Automated Testing
Now, that we have everything tied up in one, neat, backed-up package, we can finally move on to the nitty-gritty and the dirty work. So, we're rolling up our sleeves and writing the Selenium smoke test for our Alexandria client. We'll be running that in Docker containers containing different "typical Nostr" images, such as Chrome browser with Nostr Connect signing extension, or Firefox browser with Nos2x-fox extension. Once we get the Nsec Bunker and Amber logins going, we'll add test cases and images for them, as well. (Yes, we can do Bunker. I hope you are in awe at our powers).
We are also designing an automated infrastructure test, that will simply rattle through all the various internal and external websites and relays, to make sure that everything is still online and responsive.
After that, a Gherkin-based Behave feature test for Alexandria is planned, so that we can prevent regression of completed functionality, from one release to the next.
The Gherkin scenarios are written and attached to our stories before development begins (we use acceptance tests as requirements), a manual test-execution is then completed, in order to set the story to Done. These completed scenarios will be automated, following each release, with the resulting script linked to from the origin story.
Automated Builds
As the crowning glory of every DevOps tool chain stands the build automation. This is where everything gets tied together, straightened out, configured, tested, measured, and -- if everything passes the quality gates -- released. I don't have to tell you how much time developers spend staring at the build process display, praying that it all goes through and they can celebrate a Green Wave.
We are currently designing the various builds, but the ones we have defined for the Alexandria client will be a continuous delivery pipeline, like so:
This will make it easier for us to work and collaborate asynchronously and without unnecessary delays.
Expanding the Status Page
And, finally, we get to the point of all of this busyness: reporting.
We are going to have beautiful reports, and we are going to post them online, on our status page. We will use bots, to inform Nostriches of the current status of our systems, so go ahead and follow our GitCitadel DevOps npub, to make sure you don't miss out on the IT action.
Building on stone
All in all, we're really happy with the way things are humming along, now, and the steady increase in our productivity, as all the foundational work we've put in starts to pay off. It's getting easier and easier to add new team members, repos, or features/fixes, so we should be able to scale up and out from here. Our GitCitadel is built on a firm foundation.
Happy building!
-
@ 006532cb:fd8f28b4
2025-02-02 09:50:56I am new to #NOSTR and not a #Dev; however, npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn's article inspired me to research and understand further. As a result, I have condensed my learnings into 10 bullet points that seem to embody the spirit of being a nostrich and the qualities we should all strive for when engaging with one another making software choices and avoiding NINO's.
- You shall not compromise on security: Prioritize the security and integrity of user data, using best practices and Nostr's built-in features to protect against unauthorized access and malicious activity.
- You shall prioritize user agency: Respect users' mute lists, use their web of trust to filter out spam, and prioritize user control over their data.
- You shall be decentralized and open: Do not hardcode relay URLs or depend on specific relay implementations, ensuring that your platform is truly decentralized and open.
- You shall leverage Nostr's technical aspects: Take advantage of Nostr's features, such as self-authenticating data, event handlers, and relays, to build a robust and decentralized platform.
- You shall use native Nostr solutions: Prefer Nostr-native solutions to solve problems, rather than relying on legacy web services, promoting a more decentralized and resilient ecosystem.
- You shall prioritize interoperability: Implement NIP 89 (Recommended Application Handlers) to enable seamless interactions with other Nostr apps, promoting a unified and decentralized ecosystem.
- You shall engage with the community: Share knowledge, contribute to the growth of the ecosystem, and collaborate with other Nostr developers to promote a unified and thriving community.
- You shall be transparent and accountable: Be transparent in your development processes, and accountable for your actions and decisions, promoting trust and confidence in the Nostr ecosystem.
- You shall innovate and evolve: Continuously innovate and improve your platform, staying up-to-date with the latest developments in the Nostr protocol and ecosystem, to ensure the best possible experience for users.
- Embody Nostr: Your application should truly represent the Nostr protocol, using its features and network to provide unique value to users.
I am excited for the future. In Eric S. Raymond's book "The Cathedral and the Bazaar" he comments;
"...and the robust doesn't care too much"
Nostr embodies the spirit of the Bazaar, a vibrant and eclectic marketplace where the robust thrive, all are welcomed and empowered to become strong.
/GN!
-
@ da0b9bc3:4e30a4a9
2025-02-02 08:18:39Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/873174
-
@ 57d1a264:69f1fee1
2025-02-02 05:47:57Hey there, as a result of the recent SN Media Kit updated, I'll try to create few simple marketing assets for ~Stackers_Stocks territory to be spread across the web.
Feel free to share in the comments below: - Few visual references you'd like the assets to be inspired on - If visuals are not your thing, a description of your idea will help too - A slogan, or some words/concepts that express the territory's values
@BlokchainB you start, let's see how we go!
originally posted at https://stacker.news/items/873112
-
@ 57d1a264:69f1fee1
2025-02-02 05:36:57Hey there, as a result of the recent SN Media Kit updated, I'll try to create few simple marketing assets for ~Construction_and_Engineering territory to be spread across the web.
Feel free to share in the comments below: - Few visual references you'd like the assets to be inspired on - If visuals are not your thing, a description of your idea will help too - A slogan, or some words/concepts that express the territory's values
@BlokchainB you start, let's see how we go!
originally posted at https://stacker.news/items/873104
-
@ 0d20f0dd:bcd4c712
2025-02-02 03:23:23This event has been deleted; your client is ignoring the delete request.
-
@ 0d20f0dd:bcd4c712
2025-02-02 03:23:08This event has been deleted; your client is ignoring the delete request.
-
@ 3b7fc823:e194354f
2025-02-02 03:16:40Why Privacy Matters and How to Protect It
Privacy is about control. It’s not about hiding yourself but deciding what others can see about you. Just as you don’t share everything when buying a magazine, technology shouldn’t force you to reveal more than needed.
Why Privacy is Important
-
Personal Control: Privacy lets you choose what parts of your life are visible. You shouldn’t have to share everything just to use a service.
-
Security Against Exploitation: Without privacy, people and groups can be targeted by companies or governments. This abuse can lead to data breaches or unnecessary surveillance.
-
Building Trust: Privacy is key to trust in relationships and communities. When your info is safe, you can transact and communicate without fear of misuse.
How to Protect Your Privacy 1. Think Before You Share: Only share what’s necessary and know why you’re doing it. 2. Use Encryption: Encrypt sensitive communications like emails or messages. 3. Control Data Sharing: Avoid oversharing personal details online. 4. Enable Privacy Tools: Use VPNs or privacy settings on social media to shield your data. 5. Be Mindful of Metadata: Understand that metadata (like location data) can reveal more about you than the content itself. 6. Support Privacy-Focused Brands: Choose services that prioritize privacy, like encrypted messaging apps. 7. Read Privacy Policies: Know what data you’re sharing and with whom. 8. Tools like privacy.io can help visualize your digital footprint. 9. Block Trackers: Use tools like DoNotTrackMe or uBlock Origin to stop trackers from collecting your data.
Conclusion
Protecting privacy is a vital step in safeguarding your personal freedoms. By taking proactive measures, you can control what information is accessible and ensure that your rights are respected. Remember, you are your own best advocate for privacy—trust no one but yourself to protect your data and identity.
Join the movement to champion privacy as a fundamental human right. Advocate for stronger laws and encourage others to take action, so we can all enjoy safer, more secure digital environments.
-
-
@ 9e5a3a1a:ed414e8d
2025-02-02 00:51:34(deleted)
-
@ 9e5a3a1a:ed414e8d
2025-02-02 00:50:08Either the phone’s battery went bad and quit charging, or the cable was shit. The warm rain running down the screen made the phone’s UI, flicker back and forth, as Ethan turned the screen on again to check how much battery he had left. Not a lot: 4%. At least the thing was water-proof, he thought. Today was also shit. First his parents confiscated he car keys after finding booze in his closet, now the fucking charging cable went bad. (Hopefully it’s the charging cable and not the battery), he thought. A car drove by splashing him with a fan of muddy water.
“Hey!” he yelled, but the red tail lights were too far away now for the driver to hear. “Fucking fuck!” he swore looking down at himself. It was too dark to see how dirty his shirt and pants were now. The light of the gas station still far away. (Oh, well), he thought and continued walking, wet gravel and sand of road’s shoulder making wet crunching noises underfoot.
Ethan’s thumb moved on the phone to turn the flashlight on, but he stopped himself. There was almost no chance that Casey’s gas station won’t have USB cables, they always did, but with today's luck they might just be out. Then he’d be screwed without a phone for the rest of the night and all day at school tomorrow. It wouldn’t be the end of the world, but he was too irate after everything today to accept not having a phone right now.
A pale form moved to his right a few yards away. He turned and saw a figure standing by the trees. Ethan stopped and squinted through the rain. A cold, creepy feeling suddenly gripped him.
It stood there and watched him. A female form, he realized, tall and pale, with black hair longer that he’s ever seen. Something was off. The face… It’s head… The mouth grinned widely, forming a dome above the eyes, eyes that were down close to the neck, under the nose, mouth and chin up above them. (It’s fucking head is upside down..) he realized.
Ethan’s thumb pressed the phone’s power button, battery be damned. He aimed it at the figure, brought up the camera app and pressed the button to take the picture. Just as the shutter sound clicked the face was suddenly full-screen, as if a few feet away from him.
Ethan gasped and the phone tumbled onto the ground. There was a moment of relief when he realized that the figure was still far away and didn’t suddenly teleport right in front of him, but then something long, black, and wide, like a cross between a ribbon and an anaconda flicked itself toward him and the last thing he felt was a thick spiderweb of hair wrapping itself around him and pulling him forward.
“Hey, Riley, when did your dad say you needed to be back home?” Alex’s mom yelled from downstairs. The two girls glanced at their phones to see the time.
“Eleven!” Riley yelled back. They still had half an hour of “study” time. The two really did mean to study for the calculus exam, but ended up chatting the whole evening.
“Oh shit! I got to show you something,” Riley said, turning on her phone’s screen again, “You know that ‘Grin Reaper’ thing on social media?” She scrolled through her phone’s picture gallery.
“Like, that smiling ‘monster’ with upside down head?” Alex asked.
“Yeah, the one they said kidnapped those kids”
“That’s so fake!”
“Yeah, but look!” Riley turned her screen towards her friend.
Alex took the phone from her, “What’s this?”
“It’s her! Caleb was driving me to the movies and I saw her out the window. You know where Casey’s gas station is on Maple av? There’s like a wooded area just past it when you’re driving downtown.”
“It’s just some blurry figure. Probably some homeless person… What’s that?” Alex heard some kind of scratching at the window. She walked over to look. They were on the second floor, but there were no trees close enough to scratch against the window. She opened it and look outside. No one. Just a vine attached to the wall of the house outside. Or was it a vine? Along, curly splotch of dark. Alex frowned.
“No, I saw her, for real for real. It’s looks bad on the photo because it was dark and we were moving, but her head was on upside down and grinning.” Riley insisted.
(Is it ivy?) Alex thought, only half listening to Riley, (Since when do we have ivy on the house?)
Riley wondered if she should tell Alex that when she snapped the photo it looked like the woman’s grinning, upside down face was up close suddenly, right up against the car window. Caleb almost veered off the road turning to see what was wrong when she gasped and dropped the phone. When she fished her phone from beneath the seat, the photo looked normal. Blurry but normal.
(Maybe a mud splash) Alex thought, examining the black, vine-like shadow that stuck to the house aiming at the window. (Some asshole splashed mud on the house as a prank. Someone from school?)
“You think I should post it to TikTok?” Riley asked, looking pensively at the photo.
The question brought Alex’s attention back to her. She walked back over and sat on the other side of her friend, taking the phone from her hand and looking closer at the photo. “It’s dark,” Alex rolled her eyes, “Also, some troll could have just been wearing a mask trying to scare people. That shit’s all over social media.”
“I guess…” Riley decided against telling her more. She didn’t want to sound weird.
Just then, Alex heard her phone ding somewhere behind her. She looked back to find it when she heard a choking noise from where Riley sat, “You ok?” she asked looking back and froze, not quite sure what she was seeing. Riley’s eyes were wide, her hands at her throat tugging at something black, like a scarf wrapping around her neck. More dark, tentacle-like locks reached in towards them through the window. It looked like hair, but it moved as if through water, snaking itself forward and wrapping around Riley’s arms, neck and face. Before Alex could utter a sound or register what she saw, the hair straightened, pulled back, yanking Riley out through the window.
Alex sits on her bed in shock, glancing back at the window every thirty seconds. She tries to resist getting up and walking over to it. It's weird feeling of being pulled towards it to make sure it’s locked and being afraid to approach it for fear of what she might see outside. What if she sees it again? It’s tentacle-like locks crawling up the house, surrounding her window ready to snatch her like it did her friend. Can it seep through the cracks and unlock the fragile latch? She feels herself standing up and walking over to the window briskly, her hands smooth over the window latch, making sure it’s still locked, her eyes darting back and forth outside. Nothing. The dark splat on the house Alex first mistook for ivy or mud is gone, too.
She sits back on the bed. Alex can hear her parents arguing downstairs. They think she's using drugs. They searched through her room the day after Riley was taken. They yelled at her that night, them and Riley’s dad, all convinced that the girls were high and Riley wondered off somewhere. Alex knew they would not believe what really happened. But lying wouldn’t help anyone find her friend. She lets think it was all a drug-induced hallucination.
(Maybe I’m crazy,) Alex thinks. Her mind searches for mentions of schizophrenia among any of her relatives. Isn’t that shit genetic?
A chill goes through her body again, suddenly. A scratching at the window? Like the one she heard before Riley was taken? “It’s not real,” she whispers out loud. It’s not real. She keeps thinking she hears it almost as often as she walks over to check the latch on the window. “It’s not real….” She has to check.
Pushing through the fear, Alex briskly walks over to the window again. Nothing it the trees out back across the lawn. She can’t see the outside of the house without opening the window but she can’t risk it. “It wasn’t real” she affirms again. Then she has an idea.
The parents’ arguing grows louder as Alex quietly opens her bedroom door and tiptoes down the stairs toward her mom’s office, trying to avoid attracting their attention. They are still pissed, she doesn't want to deal with them. She looks for scotch tape, quickly founds it, grabs a stack of paper from the printer and goes back upstairs.
If she blocks out the window, it can’t see her, even if it is lurking somewhere outside waiting to snatch her, Alex thinks as she starts to cover the glass with paper and tape. She feels better now, suddenly. It feels like she was doing something to protect herself, even if it involves being near the window and risking seeing that thing.
As the final page of printer paper is about to go up to block the glass completely, Alex freezes. A figure stands on the grass in front of the trees. In panic, Alex tries to decipher the face in the dark. The head, it is right side up. Not grinning, no hair tentacles: not the monster. With a wave of relief, she looks closer, trying to figure out who it is, and a surge of adrenaline and excitement suddenly hits her, (It's Riley!)
“Ril--,” she almost screams, fumbling with the latch. As she pulls the window up and looks back out again, the figure is gone, “Riley!” she yells into the night. No answer. Alex pulls the window closed and runs for the door, briefly coming back to latching again, just in case.
“She’s out there! Outside.” Alex almost yells as she barged into the living groom, pointing towards the back door.
“Where? Outside?” her mom says then quickly goes to the door, dad and Alex following her. In the yard they yell Riley’s name, scanning the grass hill beyond and the tree line behind it.
“Are you sure you saw her?” her dad asks.
“Yeah, it was her, for sure.”
“Are you high again?” her mom turns to her with an annoyed grimace on her face.
“I’m not fucking high, mom!”
“Don’t you talk to me this way! Get back to your room.” her mom yells.
“I’m not fucking high, mom! I saw her.”
Mom isn’t listening, she turns to dad “We should call her parents. She could really be out there,” then to Alex, “Upstairs NOW!”
Pissed, Alex walks back into the house. It feels good to be angry, anger is better than fear. She runs up the stairs and tares down the paper she had just put up on the glass. She leans against the window and scans the tree line up in the distance.
A few hour pass. Alex still gets up from time to time to check the window, but this time she is looking for Riley rather than checking the lock. Her parents have finally quieted down downstairs. It's late. They are probably asleep by now.
Alex considers going to bed herself, but she knows she wouldn't be able to sleep. She looks back out the window.
"Riley!" Her friend is there again, closer this time. Alex opens her mouth to call to her, but stops as she saw Riley raise her finger to her lips, gesturing for her to be quiet. Alex frowns, “What the fuck are you doing?” she mouths, shrugging dramatically.
Riley motions for her to come out then puts her finger to her lips again. What is she doing?
Alex thinks about waking her parents, but decides against it. They’ll just be useless and tell her to go to her room again. She quietly creeps downstairs and sneaks out the door.
She half-expects Riley to be gone again as she walks out of the house and looks out to the hillside, but Riley is still there. Further back, almost past the tree-line. She motions Alex to come closer and takes a few steps back, disappearing in the trees.
“Fuck!” Alex swears, looks back at the house one last time, then takes off across the yard after her.
Past the tree line in the woods, Alex crunches through the trees, lighting her way (poorly) with her phone’s flashlight. Thorns scratch her arms and legs as she walks as fast as she can, navigating among the trees, yelling Riley’s name. From time to time she can see Riley's figure moving away from her, weaving among the trees. Her friend moves effortlessly, as if gliding above the ground, unimpeded by the greenery.
Alex trips. She catches herself before she tumbles to the ground. For a second it is pitch black. She bends down to look for her phone. It is a glowing outline among the plants. Alex grabs it and gets up. For a moment she’s disoriented, not sure which way she was going. She looks and listens for her friend but sees and hears nothing. She looks back. There’s a bit of light glittering through the trees back where her neighborhood is. She looks forward and yells Riley’s name again, moving her phone trying to catch a glimpse of her friend’s figure. Nothing. Should she go back? Is Riley playing some stupid game? Maybe she is high.
Without a second though, Alex continues forward, “Riley, it’s not funny! What the fuck are you doing?” Alex can see pale gray light between the leaves and the branches up ahead. She quickens her pace, almost tripping again.
Alex walks into what looks like a small clearing. The trees are further away up ahead, but not much moon-light is coming from up above. She looks up towards the wide canopy, forming a dome overhead. Her eyes suddenly focus on a humanoid shape hanging parallel to the ground from the branches above. Its face is white, torn in two by a wide smile that almost reaches its ears. The top of the head is attached to the neck. Bands of hair suspend it from branches above.
Alex freezes. For a second she feels herself cease to exist except for her breath that moves rhythmically in and out. Moments pass. How long, she can’t tell. (Run!), the thought echoes through her head, and she almost moves to obey but stops herself. To run is to turn her back on that thing. What if that’s when it grabs her. She stays still and so does the figure.
The thing blinks and its grin becomes wider. It sways back and forth, its prehensile locks making branches creak overhead. Alex’s chest and throat grows hot and and she gathers herself. She throws herself to the side, tripping yet carrying herself forward through the snapping bush branches. With sudden agility, she rights herself and runs back into the woods. Tree trunks fly at her as she runs trying not to trip on the uneven ground. She bursts into another clearing and looks back swinging her phone to light the trees behind her to look if that thing is following her. Then her vision turns off.
She feels leaves and dirt against her face, a small pointy stick poking her in her right cheek. There’s a pressure on the side of her head and her hand moves there trying to feel what’s pushing against her. There’s nothing. The side of her head is numb. Memory of where she is and why rushes back into her and she pushes herself up with a jerk. When her vision comes back online she can only see a mosaic of black and gray forms, bushy undergrowth letting in pale light ahead of her. There is a glow coming from her left. She turns and her eyes focus quickly on phone, flashlight still on, its light flooding her vision. Alex grabs it and points it forward then all around, trying to see if she’s alone or if that thing is hiding somewhere near. She doesn’t see anyone. Only trees and quick shadows jumping away from the light as he moves it.
She’s in a sort of a clearing again, except for a large tree trunk close to her. Alex reaches for the numb spot on her head and feels that it’s wet and sticky. It’s blood. She must have ran into that tree when she looked back trying to see if that monster followed her. Alex shines the light around her again. No sign of that thing. It could be hiding in the trees just out of sight. Or… her blood runs cold. She slowly looks up, remembering where she saw that thing first.
For a second, all she can see is branches and flowing, black vines like spider webs snaking through the canopy, then her eyes discern three small, slender figures hanging like poppets from these “vines”. Children. Two smaller ones and one teenager her size. The teenager, Riley, stares at with a blank expression on her face. Then her body moves, or is moved by the tentacle “vines” holding her up. Hair, Alex realizes. He is held by the hair, not wrapped around her like back in the bedroom before Riley was pulled through the window, but growing into her flesh from behind, like thousands tiny marionette strings bunched up in locks. The hair brings Rile's hand up to her side and waves it back and forth, as if in a mocking greeting gesture.
Alex tenses. At any moment, she feels, the figures can leap at her, grab her. But, no, they stay suspended. Then, between them, higher up in the branches the hair moves, like slithering snakes or tentacles moving across each other. A fourth figure is slowly lowering itself from above. The Grin Reaper. Smiling lady with an upside down head. It stops shortly after reaching the same level as the three bodies hanging by its hair. It stares at her, the grin seemingly growing wider and wider without really changing size.
“It’s not real?” Alex, whispers to herself. They aren’t moving any closer, neither the woman nor the bodies suspended by her air. Alex’s hand tightens around her phone. (Phone can’t hallucinate) she thinks to herself. Maybe now they will believe her. She aims her phone right at the woman, her figure, looming above her, looks small on the screen. With a practiced gesture her thumb touches the camera button. As the phone snaps the photo, the screen refreshes showing the things face close up, filling the frame of the phone, as if jumping out at Alex. The girl squeaks, dropping the phone. It lands light up, still illuminating the four figures far above her, as if the woman hasn’t moved despite what the photo showed. Slowly, like a coiling snake, a tentacle-like lock of hair moves up in front of the the woman, pointing at Alex like pulled-back tongue. Then, in a flash, it flies toward her her and Alex’s vision goes black.
story #shortstory #creepypasta #horror #fiction #writing #nostr
-
@ fe41d17e:28df7452
2025-02-02 13:04:38Um es vorab klarzustellen, die einzigen Gesetze an die du dich wirklich halten musst sind die Naturgesetze, es ist deine eigene Entscheidung ob du einer einseitig vom Staat beschlossenen Auflage zustimmst oder nicht, solange du bereit bist, falls du erwischt wirst, die Konsequenzen über dich ergehen zu lassen.
Wenn du diese Unterdrückung nicht mehr haben möchtest braucht es eine Revolution um den Staat irrelevant werden zu lassen und um ihm seine Grundlage (das Geld) zu entziehen ohne dabei wie er selbst zu unmoralischen Methoden zu greifen.
Diese Revolution nennt sich Agorismus, sie wird dich unabhängig vom Staat machen und den Staat langfristig schwach/überflüssig werden lassen sobald es dir genug Leute gleichtun.
Die Revolution wird nicht leicht, sie wird dir nicht die sofortige Genugtuung verschaffen, die du möglicherweise empfindest, wenn du einen Zettel in die Wahlurne wirfst und dabei das Gefühl hast, etwas verändert zu haben. Eigentlich hast du nur denselben Leuten Macht verliehen, die seit Jahrhunderten die Politiker kontrollieren, dich ausrauben und unterdrücken. Garnichts hast du damit verändert.
Es wird schwierig werden. Es wird Eigeninitiative und Veränderungen in deinem Leben erfordern. Es wird ein zermürbender, unbefriedigender Weg sein, den viele als zu hart bezeichnen werden. Es wird Jahre über Jahre dauern, in denen die Leute dich dafür schief ansehen und du kaum Anerkennung bekommen wirst.
Hier ein paar wichtige Punkte um dich mit Agorismus vertraut zu machen:
-Wenn du bereits ein Libertärer bist, lies zuerst „Das neue Libertäre Manifest“ von Samuel Edward Konkin III. Es hat nur 30 Seiten, und wenn du damit nicht zumindest deinen Horizont erweitern kannst, dann kannst du genauso gut eine britische Flagge in Amerika schwenken, Tribut zollen und einen König fordern.
-Wenn du kein Libertärer bist, lies „Eine neue Freiheit: das libertäre Manifest“ von Murray Rothbard und anschließend „Das neue Libertäre Manifest“ von SEK3.
-Konzentriere dich in deinem Leben darauf, weniger bis keine Steuern zu zahlen.
-Finde Alternativen zum Fiatgeld und sei deine eigene Bank.
-Finde lokale Quellen für Lebensmittel und Produkte.
-Handel P2P auf freien Märkten.
-Suche nach Lösungen, die auf Dezentralisierung ausgerichtet sind.
-Baue eine gewisse Menge an Lebensmitteln an, auch wenn es nur Mikrogrün ist. Dafür sind keine großen Flächen erforderlich und du kannst diese gegen andere Lebensmittel eintauschen.
-Baue dein eigenes Unternehmen außerhalb von Konzernstrukturen auf.
-Konzentriere dich auf den Handel mit anderen Agoristen.
-Nutze jede Gelegenheit um deine Verachtung gegenüber dem Staat zu äußern.
-Verbreite Agorismus.
-Beschaffe dir Waffen.
-Vertraue nur agoristischen Medien, die unpolitisch sind. Denn jeder Journalist, der dich ermutigt, zu wählen oder innerhalb des Systems zu arbeiten, könnte gekauft oder kontrolliert sein. Agoristen, die behaupten, dass Politik nicht die Antwort ist, sind die einzigen, die die Menschen wirklich von den Kontrolleuren wegführen.
Die Herrscher dieser Welt sind sich durchaus darüber im Klaren, dass das Informationszeitalter ihren Interessen schadet. Daher arbeiten sie unermüdlich an der Schaffung psychologischer Operationen (PsyOps), kontrollierter Opposition, False-Flag-Aktionen und Ablenkungsmanövern, lass dich nicht täuschen.
Erstveröffentlichung am 12. Januar auf meinem X Profil; @realbunki
-
@ 77be3409:5c7c2736
2025-02-02 12:48:25RMD Law - Personal Injury Lawyers is excited to announce the launch of its new scholarship program, designed to empower students and highlight the values of responsibility, resilience, and learning from life’s unexpected moments. This $2,500 scholarship aims to support students in their educational journeys while encouraging creativity and personal growth.
Scholarship Details
Award Amount: $2,500 Submission Deadline: December 30, 2025 Winner Announced: January 15, 2026
Eligibility Requirements To apply, students must meet the following criteria: - Be at least 16 years old and a permanent legal resident of the United States. - Be currently enrolled in a U.S. college, university, or trade school OR graduating from high school in 2025. - Have a cumulative GPA of 3.0 or higher. - Follow RMD Law on social media to see the winner announcement. - Submit all required materials by the December 30, 2025, deadline
Application Requirements Applicants are required to submit:
- A copy of their most recent high school or college transcript.
- A creative and thoughtful essay (up to 1,000 words) responding to the following prompt:
Essay Prompt: “Oops, That Was Close!”
Tell us about a moment when you narrowly avoided disaster—whether it was a hilarious mishap, an embarrassing accident, or a close call with serious consequences. - What did you learn (if anything) from the experience? - Who was at fault and why? - What would the appropriate restitution (if any) be in that situation?
Note: Applicants are encouraged to use creativity, levity, and personal insights to share their story. Let your unique voice shine through!
Selection Criteria The winner will be chosen based on: - Originality and creativity in their essay. - Relevance to the prompt. - Clarity and thoughtfulness of their response. The scholarship recipient will be announced on January 15, 2026.
How to Apply 1. Students can submit their application materials through the official RMD Law scholarship webpage: https://www.rmdlaw.com/scholarship/ 2. Follow RMD Law on social media to stay updated on the announcement and other initiatives.
About RMD Law
RMD Law is a leading personal injury law firm committed to providing exceptional legal services and making a positive impact in the communities it serves. Through initiatives like the scholarship program, RMD Law seeks to empower individuals and foster the next generation of leaders.
-
@ 57d1a264:69f1fee1
2025-02-02 00:03:39Welcome to the latest updated version of Stacker News Media Kit & Brand Guidelines
v1.2
, a pivotal location where all the visual elements find place and help us understand how to use them to have our communications cohesive. SN brand identity is built on simplicity, trust, innovation and a taste of Texas's Wild West. With the following guidelines, as promised, I'll try to outline the essential elements of SN visual language to be easily usable internally and externally.As third interaction from the previous discussion, here below you will find all the media assets in PNG and SVG downloadable from this zip file. BTW: I've been using
Nostr
🌸 Blossom Serverservers check them out, it's a really cool idea! In case the file will be not available we can always upload it in other servers. Just let me know if any issue downloading it, ideally I made three copies available from: - https://nosto.re/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip - https://blossom.poster.place/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip - https://nostr.download/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zipThe source file of all these assets still are the same Figma file and the PenPot file. This last one, has many issues and does not allow yet the same flexibility as Figma. Both files are open for contributions and comments, just need to register a dummy/anonymous account for each of the tools.
Note: To use these assets across SN, just copy-paste the image relative code, i.e.:
Stacker News Logotype
SN logo is the most recognizable visual identifier of Stacker News. It captures the essence of its brand and is to be used across the platform and other marketing materials consistently. Find below all the possible variations and colors. Ideally you should stick with it to maintain SN identity coherent, or propose something new if you feel like. If you have any question on how to place or use the logo, DO ask below, and we'll help sort it out.
| Avatar on transparent BG | Avatar on BG | Logo Extended | Logo Vertical |#| |---|---|---|---|---| |

|
|
|
|Oil Black| |
|
|
|
| Golden Yellow | |
|
|
|
|With Shadow |Stacker News Typography
This is the typography SN had used to create its logo. Download LightningVolt OpenType Font file.otf designed by Honey&Death, install it in your computer and play with it.
Typography is essential to identify, increase readability and create consistency of brands. SN uses the default
font-family:sans-serif;
of your device's OS, usually are the most common and already installed in your device:system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Noto Sans", "Liberation Sans", Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji"
. Those are mostly used for:Example Header H1
Example Header H2
Example Header H3
Example Header H4
Example Header H5
Example paragraph text The fonts selected will help to communicate the personality of the brand and provide maximum legibility for both print and screen.
Example <code>
For code, the approach is the same. Let's the device OS select its defaultmonospace
one. For example, on Mac will be one of the following:SFMono-Regular, Menlo, Monaco, Consolas, "Liberation Mono", "Courier New",`
Stacker News Colors
A thoughtfully curated color palette gives SN trust, professionalism, and approachability. Colors play a key role in creating consistent visual experiences through digital and print communications. Make sure you are using the right color codes below:
| # | Name | HEX code | RGB code | HLS | |---|---|---|---|---| |
| Bitcoin-only |
#F6911D
|rgb(246,145,29)
|hsl(32,92.3%,53.9%)
| || Blackr |
#000000
|rgb(0,0,0)
|hsl(0,0%,0%)
| || Dark |
#121214
|rgb(18,18,20)
|hsl(240,5.3%,7.5%)
| || Gold |
#FADA5E
|rgb(250,218,94)
|hsl(48,94%,67.5%)
| || Gray |
#969696
|rgb(150,150,150)
|hsl(0,0%,58.8%)
| || Light |
#F0F0F0
|rgb(240,240,240)
|hsl(0,0%,94.1%)
| || Nostrch |
#8C25F4
|rgb(140,37,244)
|hsl(270,90.4%,55.1%)
| || Pinkish |
#E685B5
|rgb(230,133,181)
|hsl(330,66%,71.2%)
| || Ruby |
#C03221
|rgb(192,50,33)
|hsl(6,70.7%,44.1%)
| || Sky Hover |
#007CBE
|rgb(0,124,190)
|hsl(201,100%,37.3%)
| || Sky Links |
#2E99D1
|rgb(46,153,209)
|hsl(201,63.9%,50%)
| || Sky Visited |
#56798E
|rgb(86,121,142)
|hsl(203,24.6%,44.7%)
| || So Fiat |
#5C8001
|rgb(92,128,1)
|hsl(77,98.4%,25.3%)
|Stacker News Icons
SN utilizes a set of bespoke icons that support its communication internally across the platform. Icons help bring instant, intuitive cues for various types of content and features. We share them here for you so you can use as you wish and satisfy your creative needs.
|

|
|[Bounty](https://m.stacker.news/75607)
|[Caret](https://m.stacker.news/75608)
|[Cowboy](https://m.stacker.news/75609)
|[Sun](https://m.stacker.news/75610)
| |---|---|---|---|---|---| |[Edit](https://m.stacker.news/75611)
|[Gun](https://m.stacker.news/75612)
|[Horse](https://m.stacker.news/75613)
|[Info](https://m.stacker.news/75614)
|[Moon](https://m.stacker.news/75615)
|[Lightning](https://m.stacker.news/75616)
| |[Bald Lost Hat](https://m.stacker.news/75617)
|[Markdown](https://m.stacker.news/75618)
|[Nostr](https://m.stacker.news/75619)
|[Referral](https://m.stacker.news/75620)
|[Rewards](https://m.stacker.news/75621)
|[Horse Lost Saddle](https://m.stacker.news/75622)
|[Search](https://m.stacker.news/75623)
| |[Shoot](https://m.stacker.news/75624)
|[Texas](https://m.stacker.news/75625)
|[Upload](https://m.stacker.news/75626)
|[Zap Zap](https://m.stacker.news/75627)
|||Stacker News Banners
Banners are important visual elements used in our digital platforms and marketing materials. They help to highlight key stories, features or announcements while maintaining our brand aesthetic.
Here below you'll find custom banners for Sn and for individial territories. I try to build those that I follow most, for now @AGORA is the only one that designed its own banners. Comment below if you'd like some banners for your territory!
SN Dark background
|970x250| |---| |

|
|
||728x90| |---| |

|SN Gold background
|970x250| |---| |

||250x250|300x250|300x600| |---|---|---| |

|
|
||728x90| |---| |

|SN by @Jon_Hodl
|970x250| |---| |

||250x250|300x250|300x600| |---|---|---| |

|
|
||728x90| |---| |

|~AGORA territory
The SN P2P Marketplace |970x250| |---| |

||250x250|300x250|300x600| |---|---|---| |

|
|
||728x90| |---| |

|~alter_native territory
|970x250| |---| |

||250x250|300x250|300x600| |---|---|---| |

|
|
||728x90| |---| |

|~bitcoin_beginners
|970x250| |---| |

||250x250|300x250|300x600| |---|---|---| |

|
|
||728x90| |---| |

|~Design territory
|970x250| |---| |

||250x250|300x250|300x600| |---|---|---| |

|
|
||728x90| |---| |

|~Music territory
|970x250| |---| |

||250x250|300x250|300x600| |---|---|---| |

|
|
||728x90| |---| |

|Anything else we could add?
If you feel something is missing, or you know a better tool to manage this media kit for SN in a collaborative and FOSS way then, DO share it in a comment below
Territory owners [^1], do you need banners for your territory? Feel free to edit the figma file liked above or comment below sharing your needs or ideas, I'll try to do something for you.
By following these guidelines, we ensure consistency and professionalism in every case where Stacker News is represented here internally to stackers or to our audience in the KYC internet, reinforcing SN credibility as a trusted source for data-driven journalism.
[^1]: FYI: @Aardvark @AGORA @anna @antic @AtlantisPleb @Bell_curve @benwehrman @bitcoinplebdev @Bitter @BlokchainB @ch0k1 @davidw @ek @elvismercury @frostdragon @grayruby @HODLR @inverselarp @Jon_Hodl @k00b @marks @MaxAWebster @mega_dreamer @niftynei @nout @OneOneSeven @OT @PlebLab @Public_N_M_E @RDClark @realBitcoinDog @roytheholographicuniverse @siggy47 @softsimon @south_korea_ln @theschoolofbitcoin @TNStacker @UCantDoThatDotNet @Undisciplined
originally posted at https://stacker.news/items/872925
-
@ 961e8955:d7fa53e4
2025-02-01 23:20:53"@YakiHonne community partners successfully convened a seminal Nostr101 meetup in Barnawa, Nigeria! Donning bespoke YakiHonne Nigeria Limited Edition T-shirts, the Purple Army infused the town with infectious energy.
Facilitated by @Olaoluwa Ezekiel Michael, this gathering leveraged YakiHonne's decentralized platform to foster unbridled dialogue, idea exchange, and community engagement.
The event's resounding success underscores the burgeoning demand for decentralized solutions in Africa. This milestone marks the inception of a revolutionary movement, empowering voices and fostering collaboration throughout the continent.
Nostr #DecentralizedRevolution #Africa #CommunityFirst #YakiHonne"
-
@ e0e92e54:d630dfaa
2025-02-01 22:32:51When a Client Wants Out…& A Yellow Flag Appears
This week was an interesting one with a client that wants to exit our agreement early.
(Totally fine. It happens and usually when one or both parties want to part ways, unless it's marriage, then it's at minimum a Yellow Flag if not a Red Flag that should be observed).
I tend to work with clients that have multiple irons in the fire, hence why they need someone like me to come along side them and provide guidance and help root them in the area they must focus on.
There is a strong parallel with this irregardless of whether it's #business #life or #impact
This client had big goals, but like many business owners, they defaulted to reactionary decisions instead of a structured plan. That’s when the Yellow Flag turned into a pattern I’ve seen before—Random Acts of X.
The Cost of Random Acts of X
If your solution is:
A. Throw money at it, and/or
B. Fire, Aim, Ready...instead of Ready, Aim, Fire
This WILL result in Random Acts of X (wherein X is whatever your are focused on, ie Marketing...aka Random Acts of Marketing essentially equates to the proverbial "throw spaghetti on the wall")
Is that really a thing? Like do Italians or some other cultures actually throw spaghetti on the wall to see if it "sticks"? Inquiring minds want to know! 🤷♂️
As I mentioned, my clients tend to have a lot of things they are trying to accomplish at once. This leads to fragmented efforts and lack luster results.
That being said, I approach everything as a relationship. Afterall, I believe:
Leadership = Relationships!
With this particular client there was one project he abruptly ended. Again, that's fine...it's their business...
Since I'm there to help them lead well, I reminded them this is a relationship and asked "What's next that you want me to focus on?"
We got on the same page with the new project and not even 2 days later that's where the Yellow Flag appeared in the form of issue A (just throw money at it).
Shortcuts Lead to Ghost Towns (Buying Followers Won’t Work)
You see, they wanted me to lead a marketing campaign to build relationships with people their company could sponsor. BUT they just wanted to "buy followers".
When I noticed one of their social accounts has 28k followers and on average only 14 impressions per post...
I asked "How's that working out for ya?"
You see folks, real relationships take time!
One cannot simply "throw money at it" and expect sound, sustainable results.
If you’re buying an audience instead of building one, you won’t have a community—you'll have a ghost town.
What Fake Engagement Looks Like in Business & Family
Think of it this way...
Imagine all you did in your family's relationships was throw money at it. You just "bought followers" in the form of taking this trip, buying that thing for them; and you totally avoided the time investment the relationship requires?
Sure...you might have been physically there...but were you present?
I run into this often with my son. He wants me to watch him play a video game. And during that time together what is he doing? He keeps looking over his shoulder to make sure I'm paying attention to HIM and not clandestinely on my phone.
Same goes for his Basketball...he wants me there rebounding for him...not sitting in a chair idly watching.
Are You Present or Just Physically There?
Business Owners and Leaders!
Husbands, Wives, and Parents!
People whom desire to have an impact!
The Process is the Shortcut!
Play silly games. Win silly prizes.
Intentionally build relationships. Reap rewards forever.
It's...
That...
Simple...
Easy? Not really...especially for someone like me whom is just as keen to spend time in nature or chillaxing with a cup of coffee on the back porch, thinking (and wishing my garden was growing better LOL).
But simple? Yes!
Create the process, execute the process, refine the process, and repeat.
The Process is the Shortcut...
Your Next Step: Cut the Shortcuts. Build the Process.
So—where do you need to refine your process today?
💡 What’s one way you can be more present in a relationship this week?
💡 What can you eliminate to move you closer to real impact—instead of just chasing more?
🔹 Drop your answer below 👇
Jason Ansley* is the founder of Above The Line Leader*, where he provides tailored leadership support and operational expertise to help business owners, entrepreneurs, and leaders thrive.
Want to strengthen your leadership and enhance operational excellence? Connect with Jason at https://abovethelineleader.com/contact
📌 This article first appeared on Nostr. You can also find more Business Leadership Articles and content at: 👉 https://abovethelineleader.com/business-leadership-articles
-
@ dbb19ae0:c3f22d5a
2025-02-01 21:51:44List of Wordpress articles:
- https://alashazam.wordpress.com/2024/07/01/python-nostr/
- https://alashazam.wordpress.com/2024/07/02/python-nostr-2/
- https://alashazam.wordpress.com/2024/07/03/python-nostr-second-program/
- https://alashazam.wordpress.com/2024/07/04/python-nostr-sdk/
- https://alashazam.wordpress.com/2024/07/04/python-nostr-third-program/
- https://alashazam.wordpress.com/2024/07/05/python-nostr-guessing-the-npub/
- https://alashazam.wordpress.com/2024/07/06/python-nostr_sdk-fetching-metadata/
- https://alashazam.wordpress.com/tag/python/
```python
!/usr/bin/env python3
""" Fetches the joined date from a Nostr profile and calculates the days since account creation.
Usage: python fetch_joined_date.py [npub]
Arguments: npub : The public key of the user (in npub format).
Requirements: - nostr_sdk library - Python 3.x
Example: python fetch_joined_date.py npub1... """
import argparse import time import ssl import json import uuid import logging from datetime import datetime from nostr.event import EventKind from nostr.relay_manager import RelayManager from nostr.key import PublicKey from nostr.filter import Filter, Filters from nostr.message_type import ClientMessageType
Configure logging
logging.basicConfig(level=logging.INFO, format="%(levelname)s: %(message)s")
RELAY_URL = "wss://relay.damus.io"
def fetch_metadata(npub): """Fetches metadata from a Nostr profile given an npub key.""" pub_key = PublicKey.from_npub(npub) filters = Filters([Filter(authors=[pub_key.hex()], kinds=[EventKind.SET_METADATA])]) subscription_id = uuid.uuid1().hex request = [ClientMessageType.REQUEST, subscription_id, *filters.to_json_array()]
relay_manager = RelayManager() relay_manager.add_relay(RELAY_URL) relay_manager.add_subscription(subscription_id, filters) try: relay_manager.open_connections({"cert_reqs": ssl.CERT_NONE}) time.sleep(1) # Allow time for connection relay_manager.publish_message(json.dumps(request)) time.sleep(1) # Allow time for response while relay_manager.message_pool.has_events(): event_msg = relay_manager.message_pool.get_event() metadata = json.loads(event_msg.event.content) return metadata except Exception as e: logging.error(f"Error fetching metadata: {e}") finally: relay_manager.close_connections() return None
def fetch_joined_date(npub): """Retrieves the joined date of a Nostr profile and calculates days since creation.""" metadata = fetch_metadata(npub) if not metadata or "created_at" not in metadata: logging.warning("Could not retrieve metadata or 'created_at' field is missing.") return
try: created_at = int(metadata["created_at"]) created_date = datetime.utcfromtimestamp(created_at) days_since_creation = (datetime.utcnow() - created_date).days logging.info(f"Account created on: {created_date.strftime('%Y-%m-%d %H:%M:%S UTC')}") logging.info(f"Days since account creation: {days_since_creation}") except (ValueError, TypeError): logging.error("Invalid 'created_at' timestamp.")
if name == "main": parser = argparse.ArgumentParser(description="Fetch the joined date from a Nostr profile.") parser.add_argument("npub", type=str, help="The public key of the user (in npub format).") args = parser.parse_args()
fetch_joined_date(args.npub)
```
-
@ 20e17dd0:2ae504d7
2025-02-01 21:14:411. Hardware Selection
It is important to select adequately the hardware that will be used to build your Node. The Node will be running 24h /7 days and will countain your lightning channels. It is important to use high quality hardware and spend the extra dollars for it.
At the time of building my Node, there was a shortage of Raspberry Pi and I was looking for an optimal alternative. I have decided to go ahead and purchase a used Mac Mini (late 2012).
It is recommended NOT to purchase a Mac Mini newer than 2012 (i.e 2014 and up) because Apple started to solder the RAM to the Logic Board after 2012. The Mac Mini Late 2012 is the last model that is fully customizable with SSD and RAM upgrades.
Here is the list of hardware that will be used in this build:
- 2 x 8G DDR3L Sodim 1600Mhz 1.35V
- 1 x Mac Mini (Late 2012) 2.5Ghz
- 1 x Samsung Evo 870 1Tb SSD ^
^ Note: As discussed earlier, it is important to select hardware of quality. I had initially purchased a low cost 2Tb SSD but it failed while trying to download the Bitcoin blockchain.
2. Hardware Upgrade
To facilitate the upgrade of the hardware, you will need the proper tools to remove some T6 & T8 screws.
Here are the steps to dismount the few components of the Mac Mini to upgrade the hardware:
- Unplug the Mac Mini.
- Turn it upside down with the black cover facing up.
-
Put your thumbs in the 2 grooves of the cover and turn the piece counterclockwise.
-
Remove the cover.
- Remove 3 x T6 screws holding the fan.
- Lift the fan and disconnect the connector by pulling gently straight up the wires.
- Remove 1x T6 screw at the bottom of the shroud (black plastic piece on the left of the fan).
-
Remove the shroud by holding the top right part with your fingers and turning it clockwise.
-
Remove 4 x T8 screws of the grill WIFI cover.
- The top of the grill is mounted under the Mac Mini case. Lift gently the bottom of the grill and pull towards yourself to remove the grill.
- Move the grill aside, you do not have to disconnect the WIFI sensor, just be careful.
2.1 Upgrading the RAM
The RAM is visible and accessible from the moment you remove the cover. Simply release each RAM by releasing the clips on the side. Once disengaged, the RAM will spring in a 45-degree angle. Remove it and put back the upgraded RAM at a 45 degree angle and push it down for it to clip.
2.2 Upgrading the SSD
It is important to note that the Mac Mini has 2 SSD bay. They are referred to as the “upper bay” and “lower bay”. Since we have flipped the Mac Mini upside down to remove the bottom cover, the “upper bay” is located under the “lower bay”.
The “upper bay” is mounted with an expansion kit that holds the SSD in position whereas the “lower bay” SSD is simply resting on top of the “upper bay” SSD.
One important aspect is that the connecting cables for the “lower bay” and “upper bay” SSD are not the same. The “upper bay” SSD connects on the logic board on the right and the “lower bay” SSD cable connects on the left. Removing the “upper bay” SSD requires removing the logic board therefore requires more work. It is recommended to install the new SSD in the “lower” bay. Here are the 2 scenarios:
1.Your Mac Mini has already a Hard Drive installed in the “lower” bay. In that case insert a credit card under the HD and gently pry it upwards. You will be able to slide it out of the bay. The reason to pry it gently is because since there is no “upper” bay drive, The HD is being held in the air by 2 screws on the side that are aligned in 2 holes in the Mac Mini case. Once the HD is removed, transfer the connecting cable and the 2 screws to the new SSD. To put back the new SSD, it is easier to rotate the Mac Mini 90 degree and have the mounting holes at the bottom and use the gravity to get the 2 mounting screws in the holes. After, connect the connector to the logic board.
- Your Mac Mini has already a Hard Drive installed in the “upper bay”? Leave it there, you do not need mounting screws, but you need a new connecting cable. You will have to buy a “lower bay connector”. Once installed on the SSD, slide the SSD on top of the original one. The connector will plug on the logic board on the left of the “upper bay” SSD connector.
A good preparation would be to go in “Disk Utility” menu on MacOS and search for “upper” or “lower” position before starting to disassemble.
Reassemble everything and you are done.
-
@ be41636e:e55c4909
2025-02-01 18:51:52Will Quantum Computers Kill Bitcoin? The Truth May Surprise You
One of the biggest fears around Bitcoin is that quantum computers (QCs) will render it obsolete. But is this really a legitimate concern, or just another doomsday myth?
The Real Threat: Not All Quantum Computers Are Equal
First, let’s get one thing straight: quantum computers already exist. The first notable ones appeared in the 1990s, built by IBM and Stanford. So why hasn’t Bitcoin already been hacked? Because it’s not about whether quantum computers exist—it’s about how powerful they need to be.
Are All Bitcoin Addresses at Risk?
No! If you’ve entered Bitcoin after 2010 or use a wallet backed up with 12 or 24 words (BIP-39, introduced in 2013), your funds are safe from quantum threats for a very long time—centuries, at least.
But why?
Understanding How Bitcoin’s Security Works
Bitcoin security is based on private keys. (These are represented by the 12-24 words you write down when setting up a wallet.) From this private key, a public key is created. In Bitcoin’s early days, people shared public keys directly to receive payments. But in 2010, Bitcoin introduced an extra layer of security: hashed addresses.
Now, instead of sharing your public key, your wallet generates a Bitcoin address, which is actually a hash of your public key. This adds an extra step for an attacker: before they can find your private key, they must first break the hash to reveal your public key.
Two Steps to Breaking Bitcoin
To steal Bitcoin using quantum computing, an attacker must:
- Break the hash (Bitcoin address → public key) using Grover’s algorithm.
- Break the elliptic curve cryptography (public key → private key) using Shor’s algorithm.
Where Do Quantum Computers Stand Today?
Let’s put things in perspective. Google’s Willow processor, which made headlines recently, has 105 physical qubits. But breaking Bitcoin’s elliptic curve cryptography (step 2 above) requires about 2,330 logical qubits, running for minutes to hours.
So how does 105 physical qubits compare to 2,330 logical qubits? It’s not even in the same league. To get 2,330 logical qubits, we'd likely need millions of physical qubits—a technology that is still decades away.
Now, even if we magically reached 2,330 logical qubits tomorrow, that only breaks public keys. It still wouldn't be enough to break Bitcoin addresses (step 1), which would take centuries with current quantum algorithms.
Who Should Be Worried?
- People who used Bitcoin before 2010 and still have funds sitting in old public-key-based addresses (P2PK addresses). Their funds could be stolen in minutes to hours if a powerful enough quantum computer emerged.
- People who reuse addresses—this exposes the public key, making it vulnerable to a quantum attack, even when you are using more modern addresses. (Many wallets, including Trust Wallet, SafePal, Exodus, and Atomic Wallet, still allow this bad practice!)
Who Can Sleep Soundly?
- Anyone using modern Bitcoin addresses (P2PKH, SegWit, Taproot). Their addresses are hashed, meaning an attacker would need centuries to break the first layer of protection before even getting to the public key.
- Anyone moving their coins periodically—since modern Bitcoin wallets generate new addresses for each transaction, public keys remain hidden.
The Concrete Wall Analogy
Think of your Bitcoin private key as being locked inside a massive vault. The first layer of protection is your Bitcoin address, which acts like a thick concrete wall. Cracking through this wall with current quantum algorithms would take centuries. Even if someone managed to break through, they would still face a second, much thinner barrier—your public key. This one would take only minutes to hours to breach. But by then, Bitcoin security upgrades would likely already be in place, leaving attackers empty-handed.
But What If We Make a Huge Quantum Leap?
Yes, it’s possible that new quantum algorithms emerge, or that quantum hardware advances faster than expected. But Bitcoin’s development community isn’t sitting idle, waiting to get wrecked. There are already proposals for quantum-resistant Bitcoin addresses, and they can be implemented before quantum computers reach a dangerous level.
The Bottom Line
🚀 Quantum computers won’t kill Bitcoin anytime soon.
📌 If you’re using a modern Bitcoin wallet, your funds are safe from quantum threats for the foreseeable future.
📌 If you reuse addresses, stop! It exposes your public key and makes you vulnerable much sooner.
📌 Bitcoin developers are already preparing for a quantum-resistant future.
So, no, quantum computers won’t be the end of Bitcoin. But they might be the end of bad security practices! 🔐
-
@ b17fccdf:b7211155
2025-02-01 18:41:27Next new resources about the MiniBolt guide have been released:
- 🆕 Roadmap: LINK
- 🆕 Dynamic Network map: LINK
- 🆕 Nostr community: LINK < ~ REMOVE the "[]" symbols from the URL (naddr...) to access
- 🆕 Linktr FOSS (UC) by Gzuuus: LINK
- 🆕 Donate webpage: 🚾 Clearnet LINK || 🧅 Onion LINK
- 🆕 Contact email: hello@minibolt.info
Enjoy it MiniBolter! 💙
-
@ be41636e:e55c4909
2025-02-01 18:35:06One of the biggest fears around Bitcoin is that quantum computers (QCs) will render it obsolete. But is this really a legitimate concern, or just another doomsday myth?
The Real Threat: Not All Quantum Computers Are Equal
First, let’s get one thing straight: quantum computers already exist. The first notable ones appeared in the 1990s, built by IBM and Stanford. So why hasn’t Bitcoin already been hacked? Because it’s not about whether quantum computers exist—it’s about how powerful they need to be.
Are All Bitcoin Addresses at Risk?
No! If you’ve entered Bitcoin after 2010 or use a wallet backed up with 12 or 24 words (BIP-39, introduced in 2013), your funds are safe from quantum threats for a very long time—centuries, at least.
But why?
Understanding How Bitcoin’s Security Works
Bitcoin security is based on private keys. (These are represented by the 12-24 words you write down when setting up a wallet.) From this private key, a public key is created. In Bitcoin’s early days, people shared public keys directly to receive payments. But in 2010, Bitcoin introduced an extra layer of security: hashed addresses.
Now, instead of sharing your public key, your wallet generates a Bitcoin address, which is actually a hash of your public key. This adds an extra step for an attacker: before they can find your private key, they must first break the hash to reveal your public key.
Two Steps to Breaking Bitcoin
To steal Bitcoin using quantum computing, an attacker must:
- Break the hash (Bitcoin address → public key) using Grover’s algorithm.
- Break the elliptic curve cryptography (public key → private key) using Shor’s algorithm.
Where Do Quantum Computers Stand Today?
Let’s put things in perspective. Google’s Willow processor, which made headlines recently, has 105 physical qubits. But breaking Bitcoin’s elliptic curve cryptography (step 2 above) requires about 2,330 logical qubits, running for minutes to hours.
So how does 105 physical qubits compare to 2,330 logical qubits? It’s not even in the same league. To get 2,330 logical qubits, we'd likely need millions of physical qubits—a technology that is still decades away.
Now, even if we magically reached 2,330 logical qubits tomorrow, that only breaks public keys. It still wouldn't be enough to break Bitcoin addresses (step 1), which would take centuries with current quantum algorithms.
Who Should Be Worried?
- People who used Bitcoin before 2010 and still have funds sitting in old public-key-based addresses (P2PK addresses). Their funds could be stolen in minutes to hours if a powerful enough quantum computer emerged.
- People who reuse addresses—this exposes the public key, making it vulnerable to a quantum attack, even when you are using more modern addresses. (Many wallets, including Trust Wallet, SafePal, Exodus, and Atomic Wallet, still allow this bad practice!)
Who Can Sleep Soundly?
- Anyone using modern Bitcoin addresses (P2PKH, SegWit, Taproot). Their addresses are hashed, meaning an attacker would need centuries to break the first layer of protection before even getting to the public key.
The Concrete Wall Analogy
Think of your Bitcoin private key as being locked inside a massive vault. The first layer of protection is your Bitcoin address, which acts like a thick concrete wall. Cracking through this wall with current quantum algorithms would take centuries. Once one breaks through this wall, they would face a second wall, which is a much thinner barrier—your public key. This one would take only minutes to hours to breach.
But What If We Make a Huge Quantum Leap?
Yes, it’s possible that new quantum algorithms emerge, or that quantum hardware advances faster than expected. But Bitcoin’s development community isn’t sitting idle, waiting to get wrecked. There are already proposals for quantum-resistant Bitcoin addresses, and they can be implemented before quantum computers reach a dangerous level.
The Bottom Line
🚀 Quantum computers won’t kill Bitcoin anytime soon.
📌 If you’re using a modern Bitcoin wallet, your funds are safe from quantum threats for the foreseeable future.
📌 If you reuse addresses, stop! It exposes your public key and makes you vulnerable much sooner.
📌 Bitcoin developers are already preparing for a quantum-resistant future.
So, no, quantum computers won’t be the end of Bitcoin. But they might be the end of bad security practices! 🔐
-
@ b17fccdf:b7211155
2025-02-01 18:28:39
Check out the MiniBolt guide -> HERE <-
- Core guides
- System
- Bitcoin
- Bitcoin client (Bitcoin Core)
- Electrum server (Fulcrum)
- Desktop signing app (Sparrow Wallet)
- Blockchain explorer (BTC RPC Explorer)
- Lightning
- Lightning client (LND)
- Channel backup
- Web app (ThunderHub)
- Mobile app (Zeus)
- Bonus guides
- System bonus guide
- Dashboard & Appearance
- System Administration
- Install / Update / Uninstall common languages
- Databases
- Security
- Resilience
- Hardware
- Bitcoin bonus guides
- Electrum servers
- Signing apps
- Desktop
- Electrum Wallet Desktop
- Decentralized exchange
- Resilience
- Fun
- Testnet
- Payment processors
- Nostr bonus guides
- Relays
- Nostr relay
🏗️ Roadmap | 🌐 Dynamic Network map | 🔧 Issues | 📥 Pull requests | 🗣️ Discussions
By ⚡2FakTor⚡
Last updated: 22/12/2024
-
@ d57360cb:4fe7d935
2025-02-01 18:22:10What is life but a preparation for the grand finale.
Think of your life up to this point. You’ve been living in the midst of death whether you pay attention to it or not.
Your youth faded, the years go by, relationships fail, careers fail, people die, the ones close to you and those you hardly know. Civilizations wiped out, total species completely gone with no trace.
Here you are in the midst of death. A vortex of change wiping everything in its path. Creating space for the unknown and new. Nothing lasts, nothing stays the same, everything ends. Ending gives great significance to life.
How will you be in the presence of someone you love knowing they or you will vanish one day?
What wouldn’t you put off if you were aware your time was slipping and there’s nothing you can do.
What would you stop doing?
What would you let go of?
Who would you forgive?
Life comes with a bullet and it has your name on it. You don’t know when it’ll happen.
Don’t believe you ever have time it’s always a fantasy. Death will knock you on your feet when you least expect it.
Use death as a doorway to a deep meaningful life.
-
@ cff1720e:15c7e2b2
2025-02-01 17:37:00Am 4. Oktober 1957 sendete Sputnik 1 erste Signale aus dem All. Die Welt war fasziniert, die Amerikaner geschockt, da die Russen sie in der Raumfahrt technologisch überholt hatten. Es folgte der Wettlauf im All mit Apollo-Programm und Mondlandung 1969. Am 27. Januar 2025 erlebte die USA einen weiteren Sputnik-Moment, diesmal durch die chinesische KI-App deepseek R1. Diese App schoss wenige Stunden nach ihrem Start auf Platz 1 der App-Stores, vorbei an dem bisherigen KI-Spitzenreiter ChatGPT. Die Aktie des KI-Chipherstellers Nvidia verlor 17% (600 Mrd. USD Börsenwert), das war der bisher höchste Tagesverlust des US-Aktienmarktes. Marc Andreessen verwendete gar die Formulierung “Sputnik-Schock", diese einseitige Sichtweise erschwert aber eine Betrachtung aus verschiedenen Perspektiven.
Was lässt sich mit ein paar Tagen Abstand daraus schlussfolgern? Die Aktionäre haben überreagiert und die Falschen bestraft. Die Nervosität der Anleger ist aber verständlich bei einem KGV von 46 bei Nvidia und 27 bei den “Magnificent Seven” (die großen US KI-Anbieter). Normale KGVs bewegen sich um 15, d.h. wir haben es mit einer ausgeprägten KI-Blase zu tun, die in Kürze platzen dürfte. Eine weitere Blase die schon vor dem Start geplatzt ist, ist das Projekt “Stargate” der Firmen OpenAI, Oracle und Softbank. In den nächsten 4 Jahren wollen sie 500 Mrd. USD für über 10 neue KI-Rechenzentren investieren, um Amerikas vermeintliche KI-Vorherrschaft gegenüber China weiter auszubauen. Die schon vorher vorhandenen Zweifel an dem Projekt (Elon Musk auf X “sie haben das Geld gar nicht”) wurden nun durch den Erfolg von deepseek verstärkt.
deepseek hat nämlich offenbart, dass die bisherige US KI-Strategie, "wir schlagen die Chinesen mit unserer DataCenter-Power", ein fataler Irrweg ist. Den Analysten von Bernstein zufolge ist das Modell von deepseek geschätzt 20 bis 40 mal billiger zu betreiben als ähnliche Modelle von OpenAI. Die Chinesen haben ihre Innovation durch Kreativität erzielt, im Gegensatz zur Gigantomanie der US-Konzerne, die sich in einem Überbietungs-Wettbewerb der Ressourcen-Verschwendung befinden. Hunderte Milliarden an Investorengeldern und ca. 9% des nationalen Stromverbrauchs führen zwar zur Bereicherung einiger Konzerne und ihrer Besitzer, nicht aber zu adäquaten Ergebnissen. Das selbe Muster konnte man bereits bei der Rüstungsbranche beobachten, die mit dem etwa 10-fachen Budget (1 Billion USD) nicht im Stande war bessere Waffensysteme zu produzieren als Russland (Oreshnik-Schock 2024).
Wenn Donald Trump wirklich Amerika stärken möchte, dann sollte er umgehend seine technokratischen Berater entlassen und Sun Tzu lesen, ein Buch, das die Grundlagen asiatischer Strategie vermittelt und den Krieg vermeiden lehrt ("Der klügste Krieger ist der, der niemals kämpfen muss"). Die chinesischen Erfolge basieren auf exzellenter Bildung, Startup-Förderung und minimaler Regulierung, Konzepte die der Westen zwar stets gepredigt aber nie geliefert hat. “Make Amerika smart again” hieße daher Abschied von Kriegsrhetorik, Embargos, Oligarchen-Projekten und der bisherigen Großmacht-Hybris. Annektionspläne für Grönland und Kanada passen nicht in das Bild, Wiederherstellung von Meinungsfreiheit und Abbau von Regulierungen schon (Streichung von Bidens KI-Regulierung Executive Order 14110). Wohin steuert Trump die USA? Wird der deepseek-Moment dabei helfen falsche Strategieansätze zu korrigieren? Das ist noch unklar, während aber schon jetzt unzweifelhaft feststeht, dass die EU und Deutschland weder bei der KI noch in der Geostrategie eine Rolle spielen, dafür aber als unangefochtene Regulierungs-Weltmeister. Herzlichen Glückwunsch!
„Man kann zwar die Realität ignorieren, aber nicht die Folgen davon ignorieren.“ Ayn Rand
Der wirkliche Gewinner dieser Woche ist aber die OpenSource-Szene mit ihren dezentralen Lösungsansätzen. Nicht nur deepseek R1 ist OpenSource sondern auch Marco o1 von Alibaba (https://github.com/huggingface). Die Nutzung ist kostenlos (ChatGPT kostet 200 USD pro Monat), daher können sowohl die Modellbildung, die Trainingsdaten als auch die Rechenleistung von unzähligen Aktivisten weltweit verteilt erbracht werden. Dafür braucht es weder Milliarden-Budgets, Regierungsprogramme oder neue DataCenter. Das Potential der Crowd übertrifft jeden zentralistischen Ansatz. Die Ergebnisse sind besser und die Kontrolle liegt nicht in den Händen einzelner. Smarte Lösung sind verteilt, das beweisen Projekte wie Bitcoin (seit 16 Jahren), Lightning und neuerdings auch Nostr. Deshalb haben wir Pareto (https://pareto.space) auf diesen Fundamenten entwickelt (Nostr, Lightning) und in 6 Monaten mit Freiwilligen mehr erreicht als viele große IT-Unternehmen in Jahren. Die Dinosaurier sterben aus, dem Schwarm gehört die Zukunft.
-
@ d1795b1a:15ab2129
2025-02-02 11:45:38The Ego is an Illusion – and Yet, We Can Shape It
Carl Jung spoke of the Shadow Self—the repressed parts of our psyche that unconsciously influence our lives. Buddhism, on the other hand, teaches that there is no self at all—our ego is an illusion, a fleeting construct that we cling to out of fear of emptiness.
These two perspectives seem to contradict each other. One tells us to integrate our hidden self, the other to dissolve it completely. But what if both are only half the picture?
I believe the Self is neither a fixed reality nor a mere illusion—it is a shapeable construct. If that is true, then the path is not to destroy the Ego-Self or blindly follow it, but to consciously shape it.
Between the Shadow and Emptiness
Our Ego-Self is our conscious identity—our thoughts, memories, and beliefs. Jung describes the Self as the totality of both the conscious and unconscious mind. Hidden in this unconscious space is the Shadow Self, containing everything we deny, suppress, or refuse to acknowledge. For Jung, the path to wholeness is integration—bringing light into the dark corners of the psyche.
Buddhism, however, goes further. It questions whether the Self exists at all. Our thoughts and emotions arise and disappear, our self-image is ever-changing—so why do we cling to something so impermanent?
Both views seem to offer opposite solutions: \ • Jung: Become WHOLE by integrating your Shadow. \ • Buddha: Become FREE by seeing the Self as an illusion.
But what if the synthesis of both is the key?
The Self as a Shapeable Reality
If the Self is not fixed but fluid, then the path forward is neither pure integration nor total dissolution but conscious creation. \ \ • Acknowledge the Shadow Self instead of fighting it. \ • See the Ego-Self not as absolute truth but as a flexible tool. \ • Engage the Solar Plexus—the center of the Unconscious Mind—through breathwork and self-awareness. \ • Use the Vagus Nerve as a bridge between conscious thought and unconscious emotion, actively shaping our beliefs and behaviors.
This aligns with New Thought philosophy, which suggests that our thoughts shape not only our perception but our reality itself. If we embrace this, the question is no longer “Who am I?” but rather: “Who do I want to be—and how can I create that Self?”
The Art of Shaping Yourself
Perhaps the Self is neither a rigid entity nor a complete illusion but a story we tell ourselves—a story we can rewrite. The key is not to destroy the Ego-Self but to use it consciously, rather than being used by it.
So the real question is not: “Does the Self exist?”
But rather: “How aware are we of the fact that we are shaping it every moment?”
-
@ da0b9bc3:4e30a4a9
2025-02-01 15:59:03I thought it easier to do a thread per day rather than per game.
Today's fixtures
Scotland V Italy
England V Ireland
originally posted at https://stacker.news/items/872386
-
@ e262ed3a:e147fbcb
2025-02-01 15:37:28Feel free to develop
I got an idea while watching a video from @BTCSessions, which I personally cannot implement technically. Therefore, I would like to present it here for discussion and free implementation. It makes sense to me, but what do I know? Let the swarm intelligence decide.
The goal of the business idea is:
How can I bring as many solo miners as possible into a pool without them having to pay for the electricity for mining and their mining hardware can be amortized quickly, so they can purchase more mining hardware? How can we financially support Bitcoin and Nostr developers in the long term? How can we intensify developers for the implementation of this idea? How can we encourage non-Bitcoiners to invest in the support of the Bitcoin network? How can we get non-Bitcoin retailers to invest in the Bitcoin network?
**The answer is: PROSPECT OF WINNING
The solution lies in a kind of RAFFLE. (Not a betting website) !**
The legal difference between a BET and a RAFFLE varies from country to country. It lies in the fact that a raffle must be very transparent regarding the chances of winning and the proceeds must go to a good cause. Those involved in the implementation can, of course, be compensated (also with a profit for the individual participants). The extent to which this is allowed would have to be checked by those who want to implement this idea.
In the following, I will describe the implementation roughly. Since this is not a sales presentation, please excuse me if the following proposal is not fully structured.
**Participants in the idea are:
Consumers (ticket buyers) Bitcoin miners Retailers Non-profit company that implement the project**
What's it about? @BTCSessions has a YouTube video about the miner FutureBit. In the dashboard of the solo miner, you could see how high the hash rate was. But above all, you could see how high the chance of winning was for the solo miner in the overall network. In the case of BTCSessions FutureBit, the hash rate was around 5 TerraHash and the chance of winning was around 1:1,000,000. (Which, according to my calculations, was not correct). The power consumption was around 32 watts. When I saw that, it suddenly dawned on me.
Could it be possible to create a website/app that determines the total hash rate of a mining pool and then offers an electronic, numbered ticket for each 1 TerraHash (TH/s) of the pool for, for example, 0.1 USD? The minimum purchase amount would be 10 tickets. The customer sees the chance of winning and could even see the possible payout. The ticket is only valid for the next block (similar to roulette).
Another variant could be that the buyer can select one or more of the next 10 blocks and purchase tickets for the selected block. Since you don't know in advance how high the pool hash rate will be 5 or 10 blocks ahead, the amount of tickets to be issued for the 2nd block, for example, could only be 90% of the current pool hash rate, the 3rd block only 80%, and so on. If block 3, for example, advances to position 2, the previously unavailable 10% will be released for further tickets. (Determined by the pool hash rate at that time)
The purchase of 10 or more tickets could be automated in the customer's account on the website/app (intervals: hourly, daily, weekly, every 10 blocks, etc.). Customers could also top up their account with satoshis, enabling automatic deductions for ticket purchases. This could be facilitated by automatically issuing a Nostr npub to each customer, which would also create a wallet at Primal.net (Strike). For non-Bitcoiners, Zaprite could be used to recharge their account. Alternatively, customers could enter a NostrWalletConnection NWC to enable automatic deductions from their Lightning wallet. The project operators might also consider running their own ecash mint, which would allow them to assign an integrated ecash address to customers without a Lightning address. Tickets with ascending numbers would be allocated strictly in the order of payment receipts.
Calculations for the miners: The FutureBit miner consumed approximately 30 watts per terahash/hour. Let's assume that 10 terahash consume 300 watts per hour, then the miner consumes 50 watts per 10 minutes (per block). Let's further assume that a kilowatt-hour of electricity costs between 10 and 30 cents, then it costs the miner 3-9 cents per hour for electricity at 10 terahash mining capacity. So, 0.5-1.5 cents per block. In the case that each ticket is sold for 1 terahash for the next block, one could automatically transfer, for example, 5% of the satoshis received from ticket sales to each participating miner in the pool (proportional to the average hash rate delivered by the miner in the last block in the pools). This happens even if the block is not found. If fewer tickets are sold than the maximum possible amount, then the 5% of the sold tickets will be distributed proportionally. (See also my Excel file?
At the center of the project is a website/app that manages the raffle. Here, anyone can register and create an account. Either as a miner, retailer, or customer with or without KYC, for example, with their own nostr nsec, wallet signature, email and password or phone number and password.
Once logged into the account, Bitcoiners can enter their Lightning address and a Bitcoin on-chain address. Non-Bitcoiners enter their financial data in case they win.
Miners must enter a Bitcoin and Lightning (or ecash) address. The pooling process is also managed in the miner's account.
Tickets can be purchased (like in a regular online shop) and paid for in any way. Zaprite could be a solution here. But also Strike, Cashapp, etc. As described above, such purchases could also be automated.
Retailers can also register as such. They will then have the opportunity to sell "tickets" to their customers and collect the money in cash. To sell tickets, they must enter the customer's name and a valid email address. After payment, they must send the purchase price via Lightning to the non-profit company, which will then confirm the purchase to the ticket buyer and the retailer with all the data. This is the receipt for the buyer. In the event of a win (the mined block must have 3-6 block confirmations), the ticket buyer will receive an email explaining all the further details of how to claim the prize. This could be a link that takes them directly to the website and logs them in directly. The winner can then enter their data on how and where the money should be paid out (Bitcoin address or bank details). Alternatively, they can go to their retailer, who can assist them by entering the data in their sub-account (customer account). To prevent the retailer from falsifying the data entry, the winner will first receive an email with the entered data, which they can confirm (if correct). Since the retailer is also involved in the win, they will also be notified.
How many tickets can be offered per round (Bitcoin block)? The number of tickets depends on the hash rate in the pool. One ticket can be issued per 1 TerraHash (TH/s). How the ticket is generated per round and customer, I don't know, as I lack the technical knowledge. Maybe as a kind of NFT that contains the corresponding data (customer number (npub) of the buyer and possibly retailer, block number, ticket number). Or as a Taproot asset on Lightning? Or as a minted ecash coin? Or simply as an entry in a database that the customer can see in their account.
The maximum payout of the winnings in the event of a found block to the ticket holders could be 70%. The remaining 30% would be distributed to the miners and retailers. For example: Miners 25%, retailers 5%. The non-profit organization receives nothing from the block rewards. Instead, it receives 65% of the revenue from all ticket sales. With a mining pool hash rate of 10,000 TH/s, where all tickets are sold continuously, a daily donation of around 93,000 USD would be generated. (see Excel.file)
The revenue, after deducting the possible costs of the organization, goes directly to @opensats and/or other organizations that support the Bitcoin network after each block. Either via Lightning or Bitcoin on-chain payment.
In the attached Excel file, you can find my calculations. Here, anyone can play through different scenarios.
What I noticed was that with maximum ticket sales per block, only around 200 USD per 10 tickets would be paid out, since each participating ticket wins in the event of a found block. Since I believe that this is not a very great incentive for buying tickets, I suggest the following variants.
Winning variants: Each purchased ticket has a running number. Ticket 1 has the number 000.000, ticket 2 has the number 000.001, ticket 10.120 has the number 010.119, and so on.
If the next block is found, then this found block in the Bitcoin blockchain has a hash. For example, block 881367 has the hash 000000000000000000014b0fab24355c71c6940584d9cd5990c0b081a31d54a4
Let's now remove the letters and read only the numbers from back to front, so the last 3 numbers are 544
Instead of every participating ticket winning, in this variant, only the tickets with the ending digits 544 win.
With, for example, 11,000 tickets sold, the ticket numbers 000.544 / 001.544 / 002.544 ... 010.544 would win. So, 11 ticket participants would win. Each winner with this number would receive around 0.284 Bitcoin (3.125 BTC / 11).
One could also let the ticket numbers with the ending digits 44 win, and thus every hundredth ticket. Or even combine it.
What I also noticed was that with retailers, a special case arises. Retailers receive 5% of the block rewards in the event of a found block. But only proportionally to the tickets sold by the retailer. This means that in order for the entire 5% to be distributed to the retailers, all 10,000 tickets of 10.000 possible tickets would have to be sold by retailers. Since not all tickets will be sold by retailers, a remaining amount will be left over. This could be distributed additionally to the miners. Or any other variant.
I hope the idea finds resonance and invites discussion. Maybe I've made some mistakes in thinking, and the idea is not feasible. But if you like the idea, please forward it to developers, investors, and others you know.
Stay humble hash sats
@nostr:npub1uf3w6w3z4kxy0zc80m6a03tt9s7855c9r8kkjmkju47xtc28l09sc30gqq
-
@ a012dc82:6458a70d
2025-02-01 15:17:38The cryptocurrency landscape is witnessing a remarkable resurgence, with Bitcoin once again leading the charge. After a period of volatility and uncertainty, Bitcoin has reclaimed its throne as the king of cryptocurrencies, drawing renewed interest from investors and financial experts alike. This article delves into the factors behind Bitcoin's comeback, its implications for the market, and what the future might hold.
Table Of Content
-
The Remarkable Recovery of Bitcoin
-
The Ripple Effect on the Crypto Market
-
Investor Sentiment: Cautious Optimism
-
The Future Outlook: Opportunities and Challenges
-
A New Era for Bitcoin
-
Conclusion
-
FAQs
The Remarkable Recovery of Bitcoin
A Surge in Value
After a tumultuous phase marked by sharp declines and skepticism, Bitcoin has made a striking comeback. The digital currency's value has seen a significant upswing, reminding investors of its potential as a high-reward, albeit high-risk, asset. This recovery is not just a numerical increase but a symbol of resilience in the face of market adversities.
Driving Factors
Several factors have contributed to Bitcoin's resurgence. These include an increase in institutional adoption, technological advancements within the blockchain ecosystem, and a growing recognition of Bitcoin as a 'digital gold' amidst economic uncertainties. Moreover, regulatory clarity in some regions has provided a more stable environment for cryptocurrency investments.
The Ripple Effect on the Crypto Market
Boosting Market Confidence
Bitcoin's rebound has had a ripple effect across the entire cryptocurrency market. Altcoins and emerging digital assets have also seen a boost in both value and investor interest. This resurgence has rekindled the enthusiasm for decentralized finance (DeFi) and non-fungible tokens (NFTs), which had waned during the market downturn.
Impact on Blockchain Innovation
The renewed interest in Bitcoin has spurred further innovation in blockchain technology. Developers and entrepreneurs are increasingly exploring new use cases for blockchain, expanding beyond traditional financial applications to areas like supply chain management, digital identity, and more.
Investor Sentiment: Cautious Optimism
Institutional Investors' Role
Institutional investors, once wary of Bitcoin's volatility, are now more open to including it in their portfolios. This shift is partly due to the improved infrastructure and regulatory frameworks that make investing in Bitcoin less risky than in its early years.
Retail Investors' Perspective
Retail investors, who were significantly affected by the previous market downturn, are approaching Bitcoin with cautious optimism. Many are drawn by the potential for high returns but remain mindful of the risks involved.
The Future Outlook: Opportunities and Challenges
Potential for Growth
With its current momentum, Bitcoin has the potential for further growth. Its evolving role in the financial ecosystem, particularly in areas like digital payments and remittances, suggests a bright future.
Navigating Challenges
However, challenges remain. Regulatory uncertainties, potential market manipulations, and the environmental impact of Bitcoin mining are issues that need addressing. How these challenges are managed will significantly influence Bitcoin's trajectory.
A New Era for Bitcoin
A Testament to Resilience
Bitcoin's comeback is a testament to its resilience and the enduring faith of its supporters. It has not only reclaimed its position as the leading cryptocurrency but has also reinforced the belief in the potential of digital currencies.
A Dynamic Future Ahead
As investors, both institutional and retail, continue to take notice, Bitcoin's journey is far from over. Its ability to adapt, innovate, and overcome challenges will shape not just its future but also that of the broader cryptocurrency market. The current phase is just the beginning of what promises to be a dynamic and transformative era for Bitcoin and digital currencies as a whole.
Conclusion
Bitcoin's resurgence marks a significant milestone in the cryptocurrency world. Its ability to bounce back from adversity and regain its status as the leading digital currency has not only bolstered investor confidence but also highlighted the growing maturity of the crypto market. As Bitcoin continues to evolve, navigating through regulatory landscapes and technological advancements, it stands as a symbol of innovation and resilience in the ever-changing world of finance.
FAQs
Why has Bitcoin's value surged recently? Bitcoin's value has surged due to factors like increased institutional adoption, advancements in blockchain technology, and its growing recognition as a digital store of value amidst economic uncertainties.
How has Bitcoin's recovery affected the overall crypto market? Bitcoin's recovery has positively impacted the entire crypto market, boosting the value of altcoins and reigniting interest in decentralized finance (DeFi) and non-fungible tokens (NFTs).
Are institutional investors now more interested in Bitcoin? Yes, institutional investors are showing increased interest in Bitcoin, thanks to improved investment infrastructure and clearer regulatory frameworks.
What are the main challenges facing Bitcoin in the future? The main challenges include regulatory uncertainties, potential market manipulations, and the environmental impact of Bitcoin mining.
Is it safe for retail investors to invest in Bitcoin now? While Bitcoin offers potential high returns, it remains a high-risk investment. Retail investors should approach with caution and consider diversifying their investment portfolio.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ df478568:2a951e67
2025-02-01 15:07:26Garlic Cashew Recipe
I wrote about selling roasted cashews as an experiment in capitalism here. I make them myself and in the spirit of free and open source software, I figured I would open-source the recipe with a catch. You can get the recipe in one of two ways.
- Become a paid subscriber to my Substack and you will get a key to unlock the cipher text
- Read it in the clear(un-encrypted) on nostr. The easiest way to do this is to navigate to primal.net in your browser and search for “marc26z.” Click on my profile and *you can find all of my writing in the clear in the reads section.
I tried using PGP in another article, but it’s a little cumbersome and pretentious. Andreas Grifin said, Nostr is what PGP should have been. A web of trust with easy-to-use encryption and verification. I tend to agree. So I’m using something else.
https://8gwifi.org/CipherFunctions.jsp
Decrypt using the passphrase below the paywall.
"To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy.”
I do not indicate a desire for too much privacy here, but I like playing with these things. I hope you enjoy playing with them too.
How To Decrypt
- Go to https://encrypt-online.com/decrypt/ on your favorite web browser.
- Choose aes-256-cbc(this is the default setting)
- Copy and paste the cipher text into the decryption field
- enter the passphrase into the passphrase field
- press the Decrypt button
- Optional: Copy and paste the decrypted recipe into a markdown editor like https://dillinger.io/
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
Passphrase: implored-junker-requires
Here is the decrypted recipe if you do not wish to learn about encryption, but want to try my delicious non-vegan cashew recipe anyway.
1 LB organic raw cashews 2 TBS beef tallow 2 TBS salt 1 TBS garlic powder
Melt tallow in the microwave Brush the tallow on the nuts. Spread onto a cookie sheet.
Preheat oven 350 degrees
Bake for 10 minutes.
Let cool.
Violá!
Enjoy your garlic-roasted cashews. Or...you can pick some up at nostr:npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
881,805https://mempool.marc26z.com/block/00000000000000000000f5d9aa481b8f2555deaa8638a3c1f2eb4ffa8f474f9d
-
@ cbaa0c82:e9313245
2025-02-01 15:07:16TheWholeGrain - #January2025
This January we really got to start the story telling of our first adventure series painted by Dakota Jernigan a.k.a. The Bitcoin Painter! The typical Singles of the month were released on Sunday along with a special Single released on the first to celebrate the New Year! Here we go, 2025! And, even with all that the monthly Concept Art, Bitcoin Art, and the newest Cover Art from Toast's Comic Collection were all still released! Not only was the first month of 2025 quite packed full of fun content, but the Bread and Toast website got a makeover! Did you notice all the explanation points!? We're all so excited we just can't help ourselves from using them!
January Sunday Singles 2025-01-01 | Sunday Single 73 Title: Happy New Year 2025 Happy New Year! What a year 2024 has been! We can’t wait to see what 2025 has in store for us! https://i.nostr.build/QFTmeR5p2FthPMXp.png
2025-01-05 | Sunday Single 074 Title: Snowflake It’s the most beautiful snowflake Toast has ever seen… until this one melts then it’s on to the next one! https://i.nostr.build/YHGeOcYv8WEP1fAf.png
2025-01-12 | Sunday Single 075 Title: Weight Lifting End-Piece has been working out since last year’s resolution. Now, time for heavy lifting! https://i.nostr.build/8lxeovAr5aK598Ze.png
2025-01-19 | Sunday Single 076 Title: Good Morning GM, Everybody! https://i.nostr.build/9jn2D2if4sFfNXzU.png
2025-01-26 | Sunday Single 077 Title: Chess When it comes to the chessboard, Bread is King. https://i.nostr.build/LZq57iL7tOWbHAKc.png
Adventure Series: Questline Bread, Toast, and End-Piece have started their journey in Grain Valley, and they have already found themselves in what used to be a village that is now been burnt to a crisp!
Writer: Daniel David (dan 🍞) Artist: Dakota Jernigan (The Bitcoin Painter)
2025-01-14 | Questline 001 - The Adventure Begins Our heroes take their first steps upon one of the oldest paths in all of Grain Valley. They can see the mountains in the background of the landscape before them. As they walk, they see in the distance ahead of them large amounts of black smoke rising until it disappears into the sky. https://i.nostr.build/ygjmYlWAZ4uPfPCn.png
2025-01-28 | Questline 002 - A Village Burned The source of smoke surrounds our heroes as their path brings them to the center of what used to be a village. It seems to be completely abandoned with no signs of life. Yet, all the remains of the village appear to have only recently burned to a crisp. What could have possibly happened here? https://i.nostr.build/BJ4L1shKh5YERzWc.png
Other Content Released in January 2025 2025-01-01 | Toast's Comic Collection Title: Iron Bread #9 "I am Iron Bread." - Tony Starch https://i.nostr.build/QJKkDCbfgc6Vqzcq.png
2025-01-08 | Concept Art Title: Second Bread Sketch A second sketch of the character Bread. Remade and cleaned up. https://i.nostr.build/4TXIRSUGA6viEaJx.png
2025-01-15 | Bitcoin Art Title: Stack Sats Toast is constantly stacking sats! https://i.nostr.build/txxkux0oJqyjNcSL.png
Thanks for checking out the fifth issue of The Whole Grain. The Whole Grain is released on the first of every month and covers all of the content released by Bread and Toast in the previous month. For all Bread and Toast content visit BreadandToast.com!
Thanks for helping us kick off 2025! Bread, Toast, and End-Piece
BreadandToast #SundaySingle #Questline #ToastsComicCollection #ConceptArt #BitcoinArt #Bread #Toast #EndPiece #Artstr #Comic #Cartoon #NostrOnly #🖼️
List of nPubs Mentioned: The Bitcoin Painter: npub1tx5ccpregnm9afq0xaj42hh93xl4qd3lfa7u74v5cdvyhwcnlanqplhd8g
dan 🍞: npub16e3vzr7dk2uepjcnl85nfare3kdapxge08gr42s99n9kg7xs8xhs90y9v6
-
@ 5d4b6c8d:8a1c1ee3
2025-02-01 14:46:05For the past few years, I've used February to get back on track with my fasting habits.
As I've described elsewhere, I try to do daily intermittent dry fasting. That's basically just a fancy way of saying that I stop eating and drinking fairly early and don't start again until later in the next today.
I'll try to do daily updates, throughout the month, for my own accountability.
Feel free to hop on if there's anything you need an accountability boost on.
I'm about to drink some coffee. It's been about 13 hours since I ate or drank anything. From my understanding, that's pretty much the minimum needed for any benefit.
originally posted at https://stacker.news/items/872299
-
@ 2fb77d26:c47a6ee1
2025-02-01 14:40:02In H. G. Wells’ Roman Die Zeitmaschine und den diversen Verfilmungen werden sie als »ausschweifend, langsam und naiv« dargestellt. Von »untermenschlicher Intelligenz« gezeichnet. Für Dan Simmons sind sie »faul, ungebildet und unkultiviert«. Die Eloi. Die als Nahrungsquelle der Morlocks gehaltenen Nachfahren des Homo sapiens. »Sie entwickeln sich rückläufig und verlernen Jahrtausende von Kultur, Denken und Vernunft, bis sie sich mit dem Vergnügen des bloßen Daseins zufrieden geben«. Ertönt das Schlüsselsignal, auf das sie von ihren Züchtern konditioniert wurden – eine umgebaute Zivilschutzsirene – trotten sie freiwillig und in hypnotischer Apathie zur Schlachtbank.
Ein ähnlichen Eindruck hatten viele Maßnahmenkritiker von den Unterstützern der mittlerweile in allen Punkten widerlegten Covid-Propaganda. Zurecht. Das Gefolge von Drosten, Lauterbach und Co. war blind für Fakten und ist ins offene Messer gelaufen. Bedauerlicherweise verhalten sich viele Maßnahmenkritiker aber nun in weiten Teilen genauso. Sie haben Idole gefunden. Wollen glauben. Sie ignorieren Informationen, Fakten und Daten und werden Opfer einer neu justierten, gut geölten Propagandamaschine. Nur, um die in ihre neuen Helden gesetzten Hoffnungen nicht aufgeben und der wenig erbaulichen Realität nicht ins Auge blicken zu müssen.
Sie glauben an Donald Trump, Javier Milei, Alice Weidel, Peter Thiel und vor allem Elon Musk. Daran, dass der supranationale Nachhaltigkeitskorporatismus am Ende sei, das Finanzsystem gerettet und Gerechtigkeit hergestellt wird. Die Widerständler von gestern sind die »Schlafschafe« von heute. Sie scheinen vergessen zu haben, wie Propaganda funktioniert. Aus diesem Grund – und weil es ein so schön griffiges Wort ist, bei dem man nur einen Buchstaben verändern muss, um daraus den Vornamen eines vermeintlichen Heilsbringers zu basteln – erlaube ich mir, die Anhänger des MAGA-Kults im Zuge der folgenden Seiten mokant als Eloi zu bezeichnen. Ein bisschen Spaß muss sein.
Kurskorrektur mit Ansage
Lynn Forester de Rothschild, in der finanzoligarchischen Hackordnung mindestens eine Ebene über BlackRock und Co. anzusiedeln, kündigte den aktuellen Narrativwechsel bereits am 30. August 2023 an, als sie bei Bloomberg sagte, der Begriff »ESG gehöre in die Tonne«. Er sei verbrannt. Auch BlackRock-CEO Larry Fink, der Marktteilnehmer zur Unterstützung von ESG »zwingen« wollte, teilte seinen Investoren bereits am 26. März 2023 mit, das in Verruf gekommene Label ESG durch den Begriff »Energiepragmatismus« zu ersetzen.
Sowohl Rothschild als auch Fink räumten aber gleichzeitig ein, dass sich die übergeordnete Agenda nicht ändern und man die »Green Economy« weiter vorantreiben werde, man diese aber besser vermarkten müsse, um konservative Kreise nicht weiter gegen sich aufzubringen. Ein simpler Marketing-Trick. Wenig überraschend also, dass sowohl BlackRock als auch sechs amerikanische Großbanken Anfang 2025 die Net Zero Initiative verließen. Zum »perfekten Zeitpunkt«, wie die New York Post bemerkt, um nicht von der negativen, anti-woken Berichterstattung rund um die verheerenden Feuersbrünste in Los Angeles tangiert zu werden.
Es scheint, als hätten die Eloi bereits wieder verdrängt, dass die WEF-Meetings 2021 und 2024 unter Arbeitstiteln wie »The Great Narrative« und »Rebuilding Trust« liefen. Artikuliertes Ziel der Davoser PR-Abteilung für Globalisierungsfragen war nämlich, sich den zunehmend echauffierten, misstrauischen Pöbel vom Hals zu halten. Durch neue Narrative und vertrauensbildende Maßnahmen. Und das hat, zumindest vorerst, ausgezeichnet funktioniert.
In den USA stieg das Vertrauen in ordnungsgemäß durchgeführte Präsidentschaftswahlen 2024 zum ersten Mal seit Jahren wieder etwas an. In Europa macht sich ebenfalls Zuversicht breit. Schließlich haben die sogenannten »Rechtspopulisten« nicht mehr nur in Italien und Ungarn, sondern auch in Finnland, der Slowakei und den Niederlanden Oberwasser. Von den Erfolgen der AFD ganz zu schweigen. Diese führen, wie zuletzt in Thüringen, trotz klarem Wählervotum zwar nicht zur Regierungsbeteiligung, weil »demokratische Prozesse« und »Brandmauern« das zu verhindern wissen – aber dabei sein ist ja bekanntlich alles. Dass Friedenstreiberin Alice Weidel den bundesdeutschen Rüstungsetat auf knapp 200 Milliarden verdoppeln will, scheint die euphorisierten Kritiker dunkelgrüner Militarisierung auch nicht auszubremsen. Hauptsache nicht grün. Oder woke.
Überstaatliche Sphären
Dabei scheint Euphorie in Anbetracht der Tatsachen alles andere als angebracht. So hat Milei nach Angaben von Global Finance zwar das argentinische »Staatsdefizit nach 123 Jahren beendet«, dafür leben heute 53 Prozent der 45 Millionen Argentinier in Armut. Der höchste Wert seit 20 Jahren. Ende 2023 waren es noch 41,7 Prozent. Daran ändert auch semantische Schützenhilfe von libertären Denkfabriken wie der Hoover Institution nichts. Die radikalen Privatisierungsfeldzüge von »El Loco« haben einen hohen Preis. Ob Aerolineas Argentinas, die staatliche Fluglinie, der Stahlproduzent IMPSA oder das Transportunternehmen Trenes Argentinos Cargas, das 7.800 Kilometer Bahnstrecke betreibt – das Volksvermögen wird an die Meistbietenden verscherbelt. Wer das ist, kann sich wohl jeder ausmalen. Denn sein Schlachtruf »Afuera!« (Raus hier!) gilt augenscheinlich nicht für BlackRock und Co. – schließlich sei Argentinien »ziemlich billig« zu haben, wie es Rick Rieder, Top-Bond-Manager des Unternehmens schon 2019 formulierte.
Man muss allerdings nicht in die Ferne schweifen, um sich der realen Gefahren für die Freiheit bewusst zu werden. Jener Gefahren, die von Personalien gänzlich unberührt bleiben. So arbeitet die Europäische Union weiter an der eID, der Grundlage des technokratisch-totalitären Kontroll-Grids. Ihre Einführung ist beschlossene Sache. Offen ist lediglich, ab wann sie zum Obligatorium wird. Auch das persönliche CO2-Budget ist auf Kurs. Mit ETS2 (EU Emissions Trading System) nimmt die EPA (Environmental Protection Agency) seit dem 1. Januar 2025 nach der Konzernwirtschaft nun kleine und mittlere Unternehmen in den Fokus und verpflichtet diese, CO2-Kompensationsabgaben auf ihren Gas-, Benzin- und Mineralölverbrauch zu entrichten. Das dürfte Heiz-, Fracht- und folglich die Lebenshaltungskosten des Bürgers in neue Höhen treiben. Bis der Sonntagsausflug mit dem Familienauto nicht mehr nur Zeit, Benzin und Nerven, sondern auch CO2-Gebühren kostet, dauert es also wohl nicht mehr allzu lange.
Dieser überparteilichen, supranational koordinierten Überwachungs- und Enteignungsagenda ist weder durch die Wahl des geringeren Übels noch durch Auswandern zu entkommen. Denn wie sich der Internetpräsenz des »Global Governance Forum« (GGF) entnehmen lässt, wird bereits eifrig an »Global Government« gearbeitet. Die UN-nahe Nichtregierungsorganisation hat sich nämlich zum Ziel gesetzt, die Charta der Vereinten Nationen bis 2028 zu aktualisieren und den allseits bekannten »Herausforderungen unserer Zeit« anzupassen. Pünktlich ab 2030 soll das neue Vertragswerk ratifiziert werden und neben neuen Befugnissen für den Internationalen Gerichtshof sowie einer UN-Streitmacht auch eine Regierungsstruktur analog der Europäischen Union ermöglichen. Sprich, eine Weltregierung. Ganz demokratisch selbstverständlich.
Neben eID und CO2-Budget sind natürlich auch die Ausweispflicht fürs Internet und die automatisierte Zensur unliebsamer Inhalte weiter auf Kurs. Nachdem die Vereinten Nationen im September 2024 bereits dem totalitären »Pakt für die Zukunft« zustimmten, wurde am Heiligabend 2024 noch rasch die neue »Konvention gegen Onlineverbrechen« durchgewunken. Und seit Januar 2025 treibt die UN die Umsetzung eines noch weitreichenderen Abkommens namens »Global Digital Compact« voran. Ein Papier, vor dem ich bereits im Juli 2023 gewarnt habe. Was all das für den Bürger bedeutet, zeigt sich in Griechenland, wo die Regierung seit Anfang des Jahres Social-Media-Konten mit Steuer-Identifikationsnummern verknüpft, um eine Alterskontrolle fürs Internet einzuführen. Damit folgt die von der EU in Kreditsklaverei gehaltene Regierung in Athen dem Vorbild Australiens, wo der Zugang so Social-Media-Plattformen künftig erst ab einem Alter von 16 Jahren erlaubt werden soll – wofür man schlussendlich jeden Nutzer kontrollieren muss, der online geht.
Auch das von vielen noch immer als Mythos abgetane Geoengineering wird derweil munter weitergeführt. Obwohl Berichte des US-Kongress und mittlerweile sogar wissenschaftliche Berater der EU-Kommission vor großflächigem Solar Radiation Management warnen. Im Rahmen eines offiziellen, 54 Seiten umfassenden Reports an die EU-Kommission sowie eines Artikels des britischen Guardian vom 9. Dezember 2024 verwies das siebenköpfige Forscherteam auf die unabschätzbaren Konsequenzen solcher Eingriffe und forderte ein EU-weites Moratorium.
Wie genau Trump, Musk, Milei, Meloni, Weidel und Co. die Welt vor diesem Sammelsurium an totalitären Übergriffigkeiten retten wollen, konnte mir bislang keiner der Eloi sagen.
DJ Trump
Warum die in Donald Trump, den »Vater der Impfung«, und sein zionistisches Kriegstreiberkabinett gesetzten Hoffnungen bald bitterer Enttäuschung weichen dürften, habe ich bereits am 14. November 2024 ausführlich beschrieben. Dass auch die beiden Hauptargumente seiner Befürworter – dass er die mRNA-Kampagne mittlerweile bereue und in seiner ersten Amtsperiode Friedenspolitik betrieben habe – schlichtweg falsch sind, ebenfalls. Denn anhand der nackten Zahlen lässt sich eindeutig belegen, dass Trump »der kriegslüsternste Präsident der jüngeren Geschichte« war. Und wie stolz er auf »Operation Warp Speed« ist, die unzählige Amerikaner Gesundheit oder Leben kostete, ließ er die Welt zuletzt am 17. November 2024 auf seinem Social-Media-Netzwerk Truth Social wissen.
Trumps Interesse gilt nicht Frieden und Freiheit, sondern Donald Trump. So war es sein ganzes Leben lang. Wenn sich »The Donald« jemandem verpflichtet fühlt, ist es vielleicht Wilbur Ross, der ehemalige Chef von Rothschild Inc. Bankruptcy Advising. Denn wie das Forbes Magazine am 8. Dezember 2016 korrekt erläuterte, rette das Bankhaus vor gut 30 Jahren nicht nur Trumps bankrotte Casinos, sondern damit auch seine ganze Karriere. Nicht weil man in Trumps Geschäften und Immobilien einen besonderen Wert sah, sondern weil man die Person Donald Trump als »Anlage« betrachtete. Trotzdem ist es sicher nur Zufall, dass Ross von 2017 bis 2021 Handelsminister der Vereinigten Staaten war.
Elon Musk
Auch über den PayPal-Mafioso, CIA-Handlanger und Bilderberg-Executive Peter Thiel, dessen Protegé JD Vance nun US-Vizepräsident ist, habe ich bereits im September 2024 einen ausführlichen Artikel geschrieben. Gleiches gilt für Elon Musk, dessen trügerisches Image als Genius, Erfinder und Entrepreneur ich sogar schon im Oktober 2022 durchleuchtet habe. Zitat:
»Dass Elon Musk nicht rein zufällig zur liberal-coolen Ikone avancierte, legt ein Blick in seine Anfangsjahre als Unternehmer nahe. Denn während im sagenumwobenen Silicon Valley Ende der 1990er-Jahre eine Vielzahl an erfolgreicheren Tech-Entrepreneuren existierte, war es ausgerechnet Elon Musk, der für einen absolut inhaltsleeren Gastauftritt bei CNN gefilmt wurde, sodass zum ersten Mal eine breitere Öffentlichkeit von ihm Notiz nehmen musste. Dabei war sein erstes Unternehmen – Zip2 –, das er im Jahre 1995 mit seinem Bruder sowie einem weiteren Partner gegründet und im Februar 1999 für circa 300 Millionen US-Dollar an Compaq veräußert hatte, nicht das revolutionärste Unterfangen im kalifornischen IT-Mekka dieser Tage. Es handelte sich um ein simples Telefonbuch fürs Internet. Wenig mehr als eine Datenbank, in die sich Unternehmen eintragen konnten, um ihre Adresse im Netz zu hinterlegen.«
Meine fast zweieinhalb Jahre alte Analyse bedarf allerdings dringend einer Aktualisierung. Denn was Musk in der Zwischenzeit trieb – und für die Zukunft plant – hat so gar nichts mit dem zu tun, was seine geradezu fanatisierten Anhänger in ihm sehen wollen.
Fangen wir der Vollständigkeit halber aber noch mal vorne an: Elon Musk hat weder PayPal gegründet noch den Tesla erfunden. Auch wenn er das gerne so darstellt. Dafür fertigte Tesla unter seiner Ägide dann aber »RNA Mikrofabriken« für das deutsche Unternehmen CureVac, das zusammen mit Bayer mRNA-Injektionen gegen Corona auf den Markt brachte. Und während Musk gegenüber der New York Post am 30. September 2020 sagte, sich nicht gegen Covid impfen lassen zu wollen, erklärte er dem TIME Magazine am 13. Dezember 2021, bereits geimpft zu sein. Zeitgeistig flexibel ist er also. Wer behauptet, Musk hätte seine Meinung zur mRNA-Technologie seit dem Covid-Fiasko signifikant geändert und sehe das Produkt nun kritisch, ist schlecht informiert. Noch am 12. April 2023 erklärte er bei Twitter, dass er mRNA für eine »medizinische Revolution« hält. Vergleichbar mit dem Schritt »von analog zu digital«.
Was Musk mit digitaler Revolution meint, zeigte sich 2017 mit Hurricane Irma. Damals gab das Unternehmen für Besitzer von Fahrzeugen mit 75 kWh ein Softwareupdate heraus, das die Reichweite von 338 auf 400 Kilometer steigerte – was im Umkehrschluss bedeutet, dass Tesla-Besitzer um eine eigentlich abrufbare Leistung ihres eigenen Fahrzeugs betrogen werden, wenn gerade keine Naturkatastrophe wütet. Dass Tesla-Kunden darüber hinaus permanent überwacht werden, zeigte sich unlängst im Rahmen der Explosion eines Cybertrucks in Las Vegas. Augenbewegungen, Mimik, Geschlecht, Hautfarbe, Körpertemperatur, Gepäckanordnung, Route, Ladestopps, Bezahlvorgänge, Telefonbuch, Musik-Playlist, Online-Abos, et cetera. Was von Sensoren und Verbindungen zu erfassen ist, wird erfasst, wie eine Untersuchung von Mozilla im Herbst 2023 feststellte. Das gilt im Übrigen nicht nur für Tesla, sondern für praktisch alle modernen Autos. Ein Tesla hat es dabei nur am leichtesten. Die gesammelten Daten werden entweder zum Schleuderpreis verkauft und/oder gegen uns verwendet.
Doch zurück zu Musk, der Twitter nicht übernahm, um Meinungsfreiheit herzustellen, sondern um die Plattform zur »Alles-App« zu machen. Sein erklärtes Vorbild: die chinesische Spionage-App WeChat. Deswegen will er alle Nutzer »als echte Menschen identifizieren«. Biometrisch versteht sich. Dafür arbeitet man bei Twitter bevorzugt mit israelischen Unternehmen zusammen, die von ehemaligen Mossad-Agenten gegründet wurden. Vielleicht stellte ja Doppelagent Jeffrey Epstein den Kontakt zum Mossad her, nachdem er Musk als regelmäßigen Teilnehmer seiner Edge-Foundation Seminare zum Thema Nudging schätzen gelernt hatte. Epstein war nämlich der einzige nennenswerte Sponsor von Edge.
Twitter kaufte Musk übrigens nicht von seinem eigenen Geld, sondern mit Hilfe von 94 Investoren, deren Namen ein US-Bundesrichter erst im August 2024 veröffentlichte, weil Jacob Silverman (Reporters Committee for Freedom of the Press) sie einklagte. Die Liste umfasst so illustre Namen wie Fidelity Investments, Sequoia Capital, Andreessen Horowitz, Bandera Fund, Binance Capital Management, Sean Combs (alias Diddy) Capital, Jack Dorsey (Twitter Gründer), Baron Opportunity Fund oder Prinz Alwaleed bin Talal al Saud von der saudischen Königsfamilie. Da wird also offenbar »der Sumpf« mit mehr Sumpf »trockengelegt«. Von der Nominierung des WEF Executive Chair Linda Yaccarino als neuer Twitter-CEO und »Freedom of Speech« versus »Freedom of Reach« mal ganz abgesehen.
Auch die von den Eloi als sensationelle Enthüllung gefeierten Twitter Files sind leider nicht ernst zu nehmen. Denn sie offenbarten nichts, was man nicht schon wusste. Zudem ist bis heute unklar, woher die veröffentlichten Informationen kamen, wer den Zugriff darauf gesteuert hat, was dort noch gespeichert war, warum praktisch nur ein von Elon ausgewählter Journalist Zugriff darauf hatte und dieser nur Screenshots, anstelle ganzer Dokumente veröffentlichen durfte. Ein echter Leak besteht aus einem Archiv, das man selbst durchsuchen kann – nicht aus ein paar handverlesenen Screenshots.
Fehlt noch Space X. Ein Unternehmen, das Musk zwar selbst gegründet hat, dessen Erfolge aber in weiten Teilen anderen Umständen zu verdanken sind. So schreibt beispielsweise inside Tesla am 22. März 2022:
»Schon Anfang der 2000er-Jahre hatte die NASA erkannt, dass ihr bald die Möglichkeit fehlen würde, selbst Astronauten und Material ins All und zur ISS zu bringen. Man machte sich also auf die Suche nach Partnern aus der Privatwirtschaft und wurde unter anderem bei Elon Musks Space X fündig. Bereits 2006, also noch in der Entwicklungsphase der Falcon 1, erhielt Musks Unternehmen fast 400 Millionen US-Dollar Startfinanzierung unter dem COTS-Programm.«
Space X war von Beginn an als verlängerte Werkbank der NASA gedacht, weil der US-Weltraumbehörde immer mehr Mittel gestrichen wurden. Die Öffentlichkeit hatte nämlich das Interesse an ziviler Raumfahrt verloren. Daher setzte man in Washington immer öfter den Rotstift an. Doch seit Musk die Menschen öffentlichkeitswirksam zum Mars befördern will – »let’s build Marsian Technocracy« – steigt das Interesse wieder. Leider muss ich die Vorfreude auf eine planetare Kolonie aber etwas dämpfen. Denn Space X wird nicht betrieben, um Menschen auf den Mars zu bringen, sondern um das »weltgrösste Netzwerk an Spionagesatelliten aufzubauen«.
Musks Weltraumagentur ist Handlanger des militärisch-industriellen Komplexes und einer der wichtigsten Vertragspartner des Pentagon. Das konnte man 2017 schon im Observer nachlesen. Oder am 9. Januar 2018 bei CNBC, die vom (missglückten) Transport eines streng geheimen US-Spionagesatelliten berichtete. Am 15. April 2022 kommentierte Tech Unwrapped zwei weitere Spionagesatelliten des US-Militärs, die Space X in die Umlaufbahn beförderte. Seit Jahren erhält das Unternehmen Milliarden von US-Regierung und Geheimdiensten. Siehe Los Angeles Times vom 30. Mai 2015: 4,9 Milliarden. Oder ein Artikel des Wall Street Journal vom 23. Februar 2024: 1,8 Milliarden. Oder eine lange Liste von staatlichen Zuwendungen, die Business Insider am 15. Dezember 2021 veröffentlichte. Damit basiert der Erfolg von Space X nicht primär auf Musks genialem Unternehmergeist, sondern auf Subventionen. Auf Steuergeldern.
Nicht zu vergessen: Starlink. Das von Space X betriebene, weltumspannende Satellitennetzwerk. Es mag den Vorteil haben, dass damit auch Menschen in entlegenen Regionen des Planeten oder Katastrophengebieten Zugriff auf das Internet haben. Dabei sollte allerdings nicht unterschlagen werden, dass Starlink in seiner finalen Ausbaustufe circa 42.000 Satelliten umfassen und damit ein permanentes Strahlungsfeld erzeugen wird. Gesundheitliche Risiken für den Homo sapiens: unklar. Darüber hinaus haben die Orbiter Zugriff auf das NORAD-Datenbanksystem, um Weltraumschrott ausweichen zu können. Sprich, sie sind permanent mit Systemen des US-Militär verbunden. Aus diesem Grund ermöglicht Starlink auch die Steuerung von Kampfdrohnen – siehe Ukraine-Konflikt – sowie 30 mal schnelleres Senden von Daten an und von US-Kampfflugzeugen. Während die Öffentlichkeit Musks Satellitennetzwerk vor allem als ziviles Produkt betrachtet, ist Starlink primär von militärischem Interesse. Nicht umsonst wird parallel Starshield aufgebaut, das dem geheimdienstlich-militärischen Komplex unter anderem die diskrete Echtzeitüberwachung der ganzen Welt erlaubt. Auch von DEW-Fähigkeiten (Directed Energy Weapon) ist die Rede. Ende 2024 befanden sich bereits 98 solcher Satelliten in erdnaher Umlaufbahn.
In Anbetracht dieser Informationen ist es also kaum verwunderlich, dass Musk seit Jahren offen für Technokratie wirbt. Für ein zentralistisches, faschistoides Herrschaftsmodell, das schon sein Großvater Joshua Haldemann als führender Kopf in den USA und Kanada vertrat. Der Familientradition folgend empfiehlt Musk eine CO2-Steuer zum Kampf gegen den Klimawandel, ein universelles Grundeinkommen, um die von der KI ausgelösten Disruptionen abzufangen und sein Neuralink Gehirnimplantat, um dem drohenden Transhumanismus etwas Transhumanismus entgegenzusetzen.
Futurum Technologicus
Für Kunden, denen Chips im Kopf irgendwie zu altbacken sind, entwickelt Musks Unternehmen in Zusammenarbeit mit iota Biosciences natürlich ein zeitgemäßeres Premiumprodukt: Neural Dust. Intelligente Nanopartikel in Staubkorngröße, die sich im Gehirn anreichern. Die lassen sich dann wahrscheinlich – wie die in Indien bereits zugelassene Nasal-Impfung gegen Covid – durch die Nase ziehen. Oder durch Luftschächte öffentlicher Gebäude pumpen. Man kann die neue Freiheit also förmlich riechen.
Ganz wie es der 44 Seiten starke »National Nanotechnology Initiative Strategic Plan« (NNI Plan) des Weißen Hauses im Oktober 2021 vorsah: »Die Öffentlichkeit einbeziehen und Mitarbeiterzahlen im Bereich Nanotechnologie erhöhen«. Nicht umsonst hat Donald Trump der entsprechenden Behörde in seiner ersten Amtszeit zusätzliche Mittel genehmigt. Genau wie Joe Biden nach ihm.
Das von der Technokratie-Bewegung vor fast einem Jahrhundert definierte nordamerikanische Technate – sprich, der amerikanische Verantwortungsbereich einer weltweiten Technokratie – sieht der von Trump und Musk reanimierten Vision einer »nordamerikanischen Union« übrigens verblüffend ähnlich. Wen interessiert bei all der Make-Great-Euphorie schon noch, dass Imperialismus scheisse, Dänemark ein souveräner Staat und der Panamakanal ein strategisches Nadelöhr der internationalen Handelsschifffahrt ist. Oder, dass die »nordamerikanische Union« nicht nur bei Trump-Cheerleadern wie Alex Jones vor ein paar Jahren noch als »böser Globalisten-Plan« galt.
Schauen wir nach vorne. In Richtung »goldenes Zeitalter«, wie Trump es nennt. Dieses dürfte für den Normalbürger nämlich sehr ungemütlich werden. Denn es wird dominiert von Algorithmen. Von Künstlicher Intelligenz. Für die Eloi also primär von Grok, dem auf Twitter (und Teslas) integrierten Chatbot. Dieser basiert auf Technologie des Unternehmens xAI – laut Wikipedia gegründet von Elon Musk im März 2023. Das mag zwar so im Handelsregister stehen, ist wohl aber nur die halbe Wahrheit. Denn xAI dürfte die Fortführung eines DARPA-Projekts darstellen, das bereits 2015 unter dem Titel »Explainable Artificial Intelligence« (XAI) gestartet wurde und 2021 auslief. Als die Finanzierung seitens DARPA eingestellt wurde, machte XAI die Forschungsergebnisse auf einem Server zugänglich. Circa 18 Monate Jahre später engagierte Elon Musk Igor Babuschkin als Chefingenieur für xAI. Babuschkin hatte zuvor acht Jahre lang für Googles DeepMind-Projekt gearbeitet und nutzte aller Wahrscheinlichkeit nach die DARPA-Ergebnisse um xAI, beziehungsweise Grok zu entwickeln.
Im Juli 2023 verkündete Musk, xAI sei im Gegensatz zu den Konkurrenzprodukten von Google, Microsoft und OpenAI eine »gute« KI. Erstaunlich, wenn die gleichen Ingenieure am Werk sind und die KI auf Basis eines Militärprojekts entsteht. Zudem sprechen auch die Top-Sponsoren von xAI nicht unbedingt für das »Gute«. Denn unter den größten Geldgebern der letzten Finanzierungsrunde vom 23. Dezember 2024 befinden sich so illustre Namen wie BlackRock, AMD, Nvidia und Fidelity, die zusammen weitere sechs Milliarden Dollar für Musks KI-Unternehmen zur Verfügung stellten.
Genug Liquidität, um xAI für die »Alles-App« weiterzuentwickeln, wo Grok seit einer Weile automatisch Kurzbeschreibungen für Profile erstellt, die man weder abschalten noch ändern kann. Twitter-Nutzer müssen nun also nicht mehr selbst das Profil eines Accounts durchstöbern, um sich einen ersten Eindruck von der Person zu machen, sondern bekommen diesen von Elon Musks KI geliefert. Vorurteil auf Knopfdruck sozusagen. Vergleichbar mit einem Sozialkreditsystem. Denn die täglich neu generierte Zusammenfassung basiert auf dem Nutzerverhalten.
»Die neuen, KI-generierten Grok-Kurzprofile unter jedem X-Nutzerprofil SIND de facto ein Social Credit System nach chinesischem Vorbild für den Westen. Das Profil jedes Nutzers wird tagesaktuell neu berechnet. Äußert man sich zu verschiedenen Themen, nennt die KI das schnell mal »verheddern«. Grok gibt zu, das Profil wird erstellt aus dem eigenen Nutzerverhalten des Tages, seinen eigenen Berechnungen und nicht näher definierten Anweisungen«, kommentierte Journalistin Aya Velázquez die Neuerung am 14. Januar 2025.
Andere Nutzer werden als »leicht erregbar« beschrieben, »verzetteln« sich oder »glauben an Wettermanipulation zur Klimakontrolle«. Offener wird ein Debattenraum dank solcher Adjektive und Zusammenfassungen sicher nicht. Wer möchte schon das Profil von leicht erregbaren Chemtrail-Gläubigen anschauen oder gar mit diesen assoziiert werden. Gegen solch eine automatisierte, herablassend daherkommende Einordnung durch intransparent operierende KI war die Faktencheck-Industrie geradezu harmlos. Wer also annimmt, die Abschaffung der Faktenchecker bei Facebook und Co. bedeute ein Ende der Zensur, irrt. Sie wird im Gegenteil deutlich raffinierter und weitreichender werden.
Details zum persönlichen Punktestand im Grok-Sozialkreditsystem oder Information über das Zustandekommen der Bewertung erhält man auf Anfrage natürlich nicht. Twitter wird die daraus entstehende Hierarchie aber mit Sicherheit für Reichweitensteuerung, Nudging-Kampagnen und weitere sozialarchitektonische Funktionen nutzen. Vor allem, wenn 2025 das Bezahlsystem »X Money« eingeführt wird. Dann werden die Eloi bald nicht mehr nur um Reichweite, Follower und Re-Tweets buhlen, sondern auch um Geld – das als Folge unliebsamer Postings zu Genozid X, Krieg Y oder Person Z künftig schneller eingefroren werden dürfte als jedes Bankkonto. De-Banking der nächsten Generation. Und irgendwann trifft das jeden. Außer, man schwimmt immer mit dem Strom.
Doch damit nicht genug. Am 13. Dezember 2024 gab das wohl den wenigsten bekannte Unternehmen WISeSat bekannt, künftig mit Space X zusammenzuarbeiten, um »verschiedene Produkte und Systeme zu kombinieren«. Die WISeSat AG ist eine Tochterfirma der in Genf (Schweiz) ansässigen WISeKey International Holding AG, die im Bereich Cybersicherheit, KI und IoT (Internet of Things) tätig ist. Die Ankündigung dieser Kollaboration ließ die WISeKey-Aktie kurzfristig um 107,73 Prozent steigen. Ein erster gemeinsamer Start zum Transport sogenannter Picosatelliten fand am 14. Januar 2025 von der Vandenberg Space Force Base in Kalifornien statt.
Aber was genau macht WISeSat? Einer Presseerklärung des Unternehmens vom 15. September 2023 lässt sich entnehmen:
»WISeSAT AG zeichnet sich dank ihrer Konstellation von ultra-sicheren Picosatelliten und Infrastruktur durch sichere und effektive Kommunikationsstrategien für vernetzte Geräte aus. Die Expertise des Unternehmens in kryptografischer Technologie und sicherem Datenmanagement hat die sichere IoT-Implementierung in zahlreichen Bereichen neu definiert, von städtischen Innovationen in Smart Cities bis hin zu modernster industrieller Automatisierung. (…) WISeSAT steht an vorderster Front bei der Entwicklung von ultra-sicheren Picosatelliten-Lösungen in Zusammenarbeit mit ihrem Verbündeten FOSSA Systems. Es setzt sich für sichere IoT-Kommunikation über raumbasierte Netzwerke ein und nutzt die neuesten kryptografischen Innovationen, um sichere und sofortige Datenaustausche in verschiedenen Bereichen zu gewährleisten (…).«
Im Klartext: WISeSat bringt Satelliten von der Größe einer Tupperdose ins All. Diese Mini-Orbiter umkreisen den Planeten in niedrigen Umlaufbahnen und etablieren dort ein Netzwerk für kryptografierte Echtzeitdatenübertragung. Fliegende 5G-Masten sozusagen. Oder WLAN-Router. Nur viel schneller. Für das Internet der Dinge – und Smart Cities.
»In dieser Woche startet WISeSat einen Satelliten der neuen Generation und markiert damit einen wichtigen Meilenstein in der Entwicklung einer globalen Satellitenkonstellation, die eine umfassende Erdabdeckung mit ultraniedriger Latenzzeit ermöglicht. Entwickelt, um Billionen von IoT-Geräten in Echtzeit zu verfolgen und aufzuspüren.« (Carlos Creus Moreira, WISeKEy CEO, 12. Januar 2025)
Welche Datenträger dieses Picosatelliten-Netzwerk künftig verfolgen und aufspüren soll, zeigt sich bei einem Blick auf das Produktportfolio der Holding-Gesellschaft WISeKey – einem »weltweit führenden Anbieter von Cybersicherheit, digitaler Identität und Internet der Dinge (IoT) Lösungen«. Denn die Holding existiert seit 24 Jahren, besteht aus fünf Unternehmen, hat mehr als eineinhalb Milliarden Chips und über fünf Milliarden »Roots of Trust« installiert, residiert an sechs internationalen Standorten und hat gut 3.000 Kunden in Staat und Wirtschaft beglückt. Einen Wikipedia-Eintrag gibt es für das bei NASDAQ und SIX gelistete Unternehmen erstaunlicherweise trotzdem nicht.
Dafür aber für den seit Mai 2021 amtierenden »Chief Digital Transformation Officer« Pierre Maudet. Der war ab Juni 2012 Mitglied des Genfer Staatsrats, 2013 bei den Young Global Leaders des Weltwirtschaftsforums und 2015 bei der Bilderberger Konferenz in Telfs-Buchen (Österreich). Nachdem er im Februar 2021 vom Genfer Polizeigericht wegen Vorteilsnahme verurteilt wurde, trat er als Staatsrat zurück – und drei Monate später bei WISeKey an. Am 30. April 2023 wurde er, ungeachtet seiner kriminellen Vergangenheit, zusätzlich wieder in den Genfer Staatsrat gewählt. Wie praktisch. Solch eine schamlose Unverfrorenheit scheint Maudet perfekt für das zu qualifizieren, was bei WISeKey unter dem Deckmantel der »Quantensicherheit« entwickelt wird – ein raumbasiertes eID-Ökosystem.
»Quantensicherheit nutzt Prinzipien der Quantenmechanik, um den Datenschutz und die sichere Informationsübertragung zu revolutionieren. Kernstück ist die Quantenschlüsselverteilung (Quantum Key Distribution, QKD), eine Spitzentechnologie, die mithilfe der Quantenmechanik vernetzte Teilchen für den sicheren Austausch von Verschlüsselungskennwerten erzeugt.«
Ob digitale Identität, Unterschrift, Cloud oder Software – von der Know-Your-Customer-Biometrie bis hin zur Unternehmenslösung für die Mitarbeiteridentifikation. WISeKey hilft. Anmelden kann sich jeder. Während die Produktpalette für den privaten Sektor noch nach Lieferketten-Management, Sendungsverfolgung, Login-Lösung für eBanking oder Face ID auf dem Smartphone klingt – aber deutlich weitreichender ist, schauen sie sich die Homepage an – sprechen die WISeKey-Angebote im Bereich Regierungen eine ganz andere Sprache. Denn unter diesem Menüpunkt bewirbt der diskret operierende Konzern seine »CertifyID Trust Center Platform«:
»Die CertifyID Trust Center Platform ist eine industrialisierte eID-Verwaltungslösung für Bürger, die Benutzer und ihre Anmeldeinformationen verwaltet, insbesondere digitale IDs und digitale Zertifikate für groß angelegte Anwendungen wie landesweite E-Government-Dienste. Es handelt sich um eine vollständige industrielle Public Key Infrastruktur- und ID-Verwaltungslösung, die Regierungsdienste rund um die Uhr unterstützt.
Die CertifyID Trust Center Plattform wird in einer Reihe von Anwendungen der Regierung und des öffentlichen Sektors verwendet, zum Beispiel: Personalausweis, ePassport (ICAO-konform), Führerschein, Gesundheit, Wahlen/Abstimmen.
Die CertifyID Plattform wurde unter Verwendung der Sicherheits- und Public Key Infrastruktur-Expertise von WISeKey entwickelt und kann vollständig in E-Government-Frameworks, kommerzielle Frameworks (…) und in das Bereitstellungsframework für E-Government-Dienste eines Landes integriert werden.«
Da passt es doch wunderbar ins Bild, dass WISeKey am 13. Oktober 2022 eine »Partnerschaftsvereinbarung zur Zusammenarbeit bei der Entwicklung weltraumbezogener Aktivitäten« mit der Schweizer Armee bekannt gab – schließlich residieren in der Alpenrepublik nicht nur UN, GAVI, WEF, Club of Rome und jede Menge NGOs, sondern auch die Bank für Internationalen Zahlungsausgleich (BIZ), die ganz sicher Verwendung für ein quantengesichertes Echtzeit-Picosatellitennetzwerk findet, wenn ihr »Unified Ledger« (Zentrales Hauptbuch) für das Blockchain-Weltfinanzsystem von morgen zum Einsatz kommt. In Anbetracht der »allumfassenden Marktblase« (D. Webb, 2024) ist damit wohl in absehbarer Zeit zu rechnen.
Das also sind die Projekte, Pläne und neuen Partner von Elon. Auf mich machen ja speziell die korrupten Genfer Quantenspezialisten mit ihren Picosatelliten und schlüsselfertigen eID-Lösungen nicht unbedingt den Eindruck von Freiheitskämpfern. Und auch die am 22. Januar 2024 bei einer Pressekonferenz im Weißen Haus angekündigten »personalisierten mRNA-Injektionen gegen Krebs« lassen mich eher skeptisch zurück.
Genau wie der Umstand, dass diese binnen 48 Stunden »personalisierte mRNA« durch die Rechenleistung von OpenAI ermöglicht werden soll. Denn das von Elon Musk mitgegründete Unternehmen des WEF- und Bilderberg-affinen Sam Altman steht im berechtigten Verdacht, für den Tod eines Whistleblowers im Dezember 2024 verantwortlich zu sein. Während Polizei und Medien den Tod des OpenAI-Forschers Suchir Balaji als Selbstmord deklarieren, sprechen sowohl die Umstände am Fundort seiner Leiche als auch Balajis Eltern von »eiskaltem Mord«. Nicht zu vergessen, dass Altman von seiner eigenen Schwester des jahrelangen Missbrauchs beschuldigt wird und sich dafür demnächst vor Gericht verantworten muss. Selbst The Economist räumte am 10. Dezember 2024 ein, dass »die PayPal Mafia die amerikanische Regierung übernimmt«. Und das mit der »Mafia« scheint man in Washington mittlerweile wörtlich zu nehmen.
Aber die von einigen aus der Hüfte geschossenen Präsidialdekreten euphorisierten Eloi werden sicher Gründe finden, das alles zu ihren Gunsten auszulegen. Immerhin hat Trump ein paar Leute begnadigt und will aus der WHO austreten. Wie seine Fanbase es bewerkstelligt, auszublenden, dass »The Donald« schon in seiner ersten Amtszeit aus der WHO austreten wollte und es unterließ, erschließt sich mir aber leider nicht. Genau wie die Begeisterung für ein Gespräch zwischen Musk und Weidel. Man stelle sich nur mal vor, George Soros, Bill Gates oder Eric Schmitt konferierten mit deutschen Politikern. Oder bekämen Sendezeit im ÖRR. Nicht auszudenken.
Wie heißt es so schön: »Eine schmerzliche Wahrheit ist besser als eine Lüge« (Thomas Mann). Stimmt. Nur fällt es relativ schwer, eine Lüge einzugestehen, wenn der, dem man sie beichten muss, der Lügner ist.
So bleibt nur zu hoffen, dass möglichst viele Eloi diesen Schritt trotzdem möglichst bald hinter sich bringen. Im eigenen Interesse. Denn wie schon Ernst Freiherr von Feuchtersleben feststellte, ist »Reue der Verstand, der zu spät kommt«. Und das kann in diesen Tagen verheerende Folgen haben.
-
@ 4fe4a528:3ff6bf06
2025-02-01 13:41:28In my last article I wrote about NOSTR. I found another local bitcoiner via NOSTR last week so here is why it is important to join / use NOSTR — start telling people “Look me up on NOSTR”
Self-sovereign identity (SSI) is a revolutionary approach to digital identity that puts individuals in control of their own identity and personal data. Unlike traditional digital identity models, which rely on third-party organizations to manage and authenticate identities, SSI empowers individuals to own and manage their digital identity.
This approach is made possible by emerging technologies such as secure public / private key pairs. Decentralized identifiers, conceived and developed by nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 is an attempt to create a global technical standard around cryptographically secured identifiers - a secure, universal, and sovereign form of digital ID. This technology uses peer-to-peer technology to remove the need for intermediaries to own and authenticate ID information.
Notably, NOSTR, a decentralized protocol, has already begun to utilize decentralized IDs, demonstrating the potential of this technology in real-world applications. Via NOSTR, users can be sure that the person or computer publishing to a particular npub knows their nsec (password for your npub), highlighting the secure and decentralized nature of this approach.
With SSI, individuals can decide how their personal data is used, shared, and protected, giving them greater control and agency over their digital lives.
The benefits of SSI are numerous, including:
Enhanced security and protection of personal data. Reduced risk of identity theft and fraud Increased autonomy and agency over one's digital identity. Improved scalability and flexibility in digital identity management
challenges:
Ensuring the security and integrity of decentralized identity systems. Developing standards and protocols for interoperability and compatibility. Addressing concerns around ownership and control of personal data. Balancing individual autonomy with the need for verification and authentication in various contexts.
Overall, self-sovereign identity has the potential to transform the way we think about digital identity and provide individuals with greater control and agency over their personal data. Without people in control of their bitcoin seed words no freedom loving people would be able to exchange their money with others. Yes, keep enjoying using the only free market on the planet BITCOIN. Long live FREEDOM!
-
@ eff2631b:4732bd7e
2025-02-01 11:40:14This is a test. Trying to use Obsidian for everything. Nostr works out of the box? First try failed, this is my second try.
-
@ eff2631b:4732bd7e
2025-02-01 11:28:43This is a test. Trying to use Obsidian for everything. Nostr works out of the box?
-
@ 9e69e420:d12360c2
2025-02-01 11:16:04Federal employees must remove pronouns from email signatures by the end of the day. This directive comes from internal memos tied to two executive orders signed by Donald Trump. The orders target diversity and equity programs within the government.
CDC, Department of Transportation, and Department of Energy employees were affected. Staff were instructed to make changes in line with revised policy prohibiting certain language.
One CDC employee shared frustration, stating, “In my decade-plus years at CDC, I've never been told what I can and can't put in my email signature.” The directive is part of a broader effort to eliminate DEI initiatives from federal discourse.
-
@ da0b9bc3:4e30a4a9
2025-02-01 09:45:00Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/872135
-
@ dbb19ae0:c3f22d5a
2025-02-01 09:06:49The Magic of
=()=
in Perl: Counting Matches with ElegancePerl is full of powerful and sometimes cryptic features, and one of the lesser-known yet highly useful tricks is the
=()=
operator. This clever construct allows you to count the number of matches in a string without using loops or unnecessary variables.
Understanding
=()=
: A Smart Counting TrickNormally, when you apply a regex with the
/g
(global match) flag, Perl finds all occurrences in the string. However, getting the count of those matches isn't as straightforward as you might expect.Consider this example:
perl my $str = "Hello 123, Perl 456!"; my $count = () = $str =~ /\w/g; print "Matched $count word characters.\n";
Breaking It Down
- Regex Matching (
$str =~ /\w/g
) - This searches for all word characters (
\w
→[A-Za-z0-9_]
) in$str
. -
The
/g
flag ensures it captures all occurrences instead of just the first one. -
The Empty List
()
- The regex match is assigned to an empty list
()
. -
This forces Perl to evaluate the regex in list context, where it returns all matches instead of just one.
-
Assigning to a Scalar (
$count
) - When a list is assigned to a scalar, Perl doesn't store the list—it simply counts its elements.
- The result?
$count
contains the number of matches.
Expected Output
Matched 15 word characters.
If you manually count the\w
matches (Hello123Perl456
), you'll find 15.
Why Not Use
scalar()
Instead?You might think this is equivalent to:
perl my $count = scalar($str =~ /\w/g); # will return 1
But this won't work!scalar($str =~ /\w/g)
only returns the last match found, not the count.=()=
is necessary because it forces list context, ensuring Perl counts all matches correctly.
Practical Use Cases
This trick is useful whenever you need to count occurrences without modifying the original string. Some real-world applications include:
✅ Counting words, numbers, or special characters in a string.
✅ Measuring how many times a pattern appears in a text.
✅ Quick validation checks (e.g., ensuring a string contains at leastn
digits).Example: Counting words in a sentence
perl my $sentence = "Perl is awesome!"; my $word_count = () = $sentence =~ /\b\w+\b/g; print "Word count: $word_count\n"; # Output: 3
Final Thoughts
The
=()=
operator might look like magic at first, but it's actually an elegant way to force list context and extract match counts without loops or extra variables. Whether processing text or just trying to optimize Perl scripts, this trick is a powerful addition to the Perl toolkit. - Regex Matching (
-
@ e1d968f7:5d90f764
2025-02-01 08:42:02In escorting, genuine connection is one of the most rewarding aspects of the job. However, sometimes the intimacy we share can blur the professional boundaries that are essential for maintaining a healthy relationship with my clients. While I cherish every connection, there are moments when a client’s emotional investment begins to cross the line from a professional encounter into personal attachment.
The intensity of our interactions can make it easy for a client to open up and share deeply personal details. This vulnerability creates a temporary but powerful bond. Yet when that bond starts to develop into constant, unsolicited communication or expectations for exclusivity, I know it’s time to re-establish the professional limits of our relationship.
I have learnt to recognise the early signs of over-attachment. When a client starts reaching out frequently outside of scheduled sessions or makes repeated requests for personal information that I have intentionally kept private, it signals that they are seeking more than what the professional context allows. Often, such clients may also express jealousy or expect special treatment, which further indicates that their feelings have moved beyond what is appropriate in our arrangement.
Handling these situations requires a balance of empathy and firmness. I strive to be understanding, acknowledging the client’s feelings while gently reminding them of the boundaries we agreed upon. For instance, if a client begins to overstep, I calmly steer the conversation back to the professional framework, clarifying that my availability and the nature of our interactions are confined to what was initially agreed. I also make it clear that while I value our connection, it must remain within the parameters of our professional relationship for the benefit of both parties.
I also take time to reflect on these interactions afterwards. It is important for me to process the emotional complexities of the situation and reaffirm my commitment to maintaining boundaries that protect my own mental and emotional health. By doing so, I ensure that my support for my clients remains compassionate without leading to personal overinvestment.
Ultimately, navigating the fine line between connection and over-attachment is one of the most challenging aspects of my work. It serves as a reminder that while the emotional bonds formed during our encounters can be deeply fulfilling, preserving clear professional boundaries is essential for sustaining a healthy dynamic. This balance not only protects me but also ensures that my clients receive a respectful and meaningful experience that remains safely within the confines of our agreement.
Rebecca x
-
@ 0271e1b9:ad8cff90
2025-02-01 07:39:31I study the greats. For if and when I find myself beaten down into the gutters of life - the vile, bile and the mundane - I shall draw strength from other great men - past, present and future - who, quite often, faced many more adversities and a lot more suffering, but chose to use them to their advantage, to overcome their dire circumstances and rise above the afflictions that life had bestowed upon them. It’s all been done before. It can be done again, better.
Learning from the past and from the present is very straightforward. Anyone can do that. But how does one learn from the future? It’s simple: you envision the best possible future for humanity, for generations to come, and for yourself. Then you figure out an approximate path on how to get there, and what kind of a man or a woman you must be to walk that path. The skills, the mindset, the qualities. And lastly, but perhaps most importantly, you find actionable measures, habits, convictions on how to become that person - and conversely, what are stopping you from becoming that person.
“You must value learning above everything else.”
― Robert Greene
“Those who have a 'why' to live, can bear with almost any 'how'.”
― Viktor E. Frankl
“You need to look at all events as having value. If you can do that, then you’re in a zone of tremendous opportunity.”
― Phil Stutz
“I shall take the more pains to uncover the fountains of philosophy, from which all my eloquence has taken its rise.”
― Marcus Tullius Cicero
“Error correction is the basis of all intelligence.”
― Jeff Booth
“Yes, you’re likely to fail, that’s fine. Because the goal of playing is not to win, but to keep learning. And the day you stop learning is the day you stop living."
― Jesse Enkamp
"A man is great not because he hasn't failed; a man is great because failure hasn't stopped him."
— Confucius
“If people knew how hard I had to work to gain my mastery, it would not seem so wonderful at all.”
― Michelangelo
“First of all we have to decide what we are to do and what manner of men we wish to be - the most difficult problem in the world.”
― Marcus Tullius Cicero
“You either bleed soul into your work, or let the work bleed out your soul.”
― Pran Yoganthan
"The Stoic philosopher is the man who has liberated himself from fear. He’s not afraid of death, he’s not afraid of pain, he’s not afraid of other people’s dismissal as a fool. The only thing he cares about is that he should meet his moral obligations.”
― Michael Sugrue
"The strong do what they can and the weak suffer what they must."
― Thucydides
“The brain is the most powerful weapon in the world.”
― David Goggins
“Man, the bravest of animals, and the one most accustomed to suffering, does not repudiate suffering as such; he desires it, he even seeks it out, provided he is shown a meaning for it, a purpose of suffering. The meaninglessness of suffering, not suffering itself, was the curse that lay over mankind so far.”
― Friedrich Nietzsche
"Consciousness is awareness with a choice."
― Thomas Campbell
“The essence of philosophy is that a man should so live that his happiness shall depend as little as possible on external things.”
― Epictetus
“It’s most real, it’s most good and it’s most salvific - it saves you, it transforms you. That’s the sacred.”
— John Vervaeke
“It is impossible for a man to learn what he thinks he already knows.”
― Epictetus
“Evolution is a process of iteration. There’s no master plan. It’s in each moment of what happens.”
― Michael Behrens
“Don’t follow anybody and don’t accept anyone as a teacher, except when you become your own teacher and disciple.”
― Jiddu Krishnamurti
“This is your life. You’re accountable. What are you gonna do about that?”
― James Hollis
By the way, if you enjoyed these quotes, feel free to follow a little side project of mine: Stoic Resurrection
Peace & Love,
Block height 881,748
-
@ 000002de:c05780a7
2025-02-01 05:23:37originally posted at https://stacker.news/items/872035
-
@ f1989a96:bcaaf2c1
2025-01-31 21:22:59In the summer of 2023, the Human Rights Foundation (HRF) launched a Bitcoin Bounty program aimed at funding software developers to create new tools and features for Bitcoin tailored to the needs of dissidents and human rights advocates challenging authoritarianism worldwide. These bounties ranged from UX improvements to privacy upgrades and open-sourcing closed and permissioned systems.
There were 11 bounties in total, each with specific objectives. The deadline was Dec. 31, 2024.
We are excited to announce that every single bounty was claimed and that the resulting tools and upgrades are now empowering human rights activists daily across popular apps such as Blue Wallet, Zeus, Stack Wallet, Iris, Coracle, Keeper, Bull Bitcoin, Cake Wallet, and more.
This program highlights the impact of collaboration between human rights activists and software developers to create better tools for freedom. HRF is proud to have played a role in this effort and looks forward to continuing similar programs in the future. Special credit goes to the Oslo Freedom Forum, where much of the critical interaction between developers and activists occurred.
This wave of bounties was inspired by a successful pilot project in 2021, executed in partnership with Strike and Jack Mallers, which supported developers like Will Cassarin and Calle. Their innovations later gave rise to important advancements such as zaps in Nostr and the Cashu ecash protocol.
Bounty Details
1. Open-Sourcing the Design Guide
Winner: CypherStack for porting the Bitcoin UI Kit from Figma to an open-source Penpot project (2 BTC awarded).
Many UI kits are created using proprietary software like Figma. While these tools are powerful, they require licenses and are not accessible to everyone — an obstacle for developers working on open-source projects or those with limited funds. This creates a barrier to entry for designers and developers wanting to contribute to the Bitcoin ecosystem. This bounty was awarded to CypherStack for porting the Bitcoin UI Kit from Figma to Penpot, an open-source design tool similar to Figma, but free and accessible to everyone. This helped democratize access to information and resources, promote collaboration, and make it easier for developers to create high-quality Bitcoin tools, which in turn helped to increase Bitcoin adoption.
2. Serverless Payjoin
Winners: This is a two-part bounty. The first bounty is for the development of the Serverless Payjoin specification, and the second bounty is for any wallets that implement Serverless Payjoin.
Part 1: Dan Gould for his work on PayJoin V2 (1 BTC)
Part 2: Dan Gould, Spacebear from Payjoin DevKit, and Bull Bitcoin app, for their collaborative effort implementing Payjoin into the Bull Bitcoin wallet (0.5 BTC split three ways).
PayJoin is a privacy upgrade to Bitcoin that flusters mass surveillance attempts on the network. Traditional implementations have required the receiver to run a server for transaction coordination, creating a barrier to adoption. Serverless PayJoin removed this dependency and simplified the process. Serverless PayJoin also eliminated the need for receiver-hosted infrastructure and reduced censorship risks by removing a central point of failure — a significant advantage for activists and nonprofits operating under repressive regimes. This bounty resulted in the first mobile app (Bull Bitcoin) with integrated PayJoin send and receive support, an important advancement that provided robust privacy protections against surveillance for at-risk individuals.
3. End-to-End Encrypted Nostr Group Chats
Winners: Martti Malmi for incorporating encrypted group chat functionality into the Iris Nostr client (1 BTC) and to Vitor Pamplona, hodlbod, and Paul Miller for their work on NIP-17, which allowed users to encrypt and share Nostr messages in a way that can be recognized across different Nostr clients (1 BTC).
End-to-End Encrypted (E2EE) Nostr Group Chats are private, secure messaging groups built on the Nostr protocol, a decentralized communication system. While Nostr messages are already encrypted, they still expose metadata, allowing outside observers to see who is communicating and when. This bounty focused on preventing metadata leakage, ensuring that these details remain private. By leveraging Nostr’s decentralized architecture, these chats offered censorship resistance. They prevented conversations from being surveilled, blocked, or controlled by a central authority, and as a result of this bounty, have now been implemented into popular Nostr clients like Iris, Amethyst, and Coracle. This is an important step forward for activists, journalists, and communities who risk losing their freedom of speech under oppressive regimes.
4. Silent Payments
Winners: cygnet3 and Sosthene for their contributions to critical libraries for delivering Silent Payments and for developing a mobile wallet capable of sending and receiving Silent Payments without requiring a full node (1 BTC).
Silent Payments are a privacy-enhancing Bitcoin addressing scheme that allows a sender to generate a unique static address for a recipient without requiring any interaction (while still allowing the recipient to detect and spend the received funds). This breaks common tracking methods used by surveillance firms and autocracies and makes it harder to link payments to a specific recipient. By improving on the privacy of traditional Bitcoin addresses, Silent Payments enhanced financial privacy, making them ideal for donations, salaries, and other sensitive transactions. This bounty code has been fully integrated into Cake Wallet, and several other major wallets like Wasabi, Blue Wallet, and Bitbox have added partial functionality. This brings Silent Payments to tens of thousands of users and marks a major step in real-world Bitcoin privacy.
5. Human-Readable Offers
Winners: Stephen DeLorme, Chad Welch, and Evan Kaloudis for Twelve Cash and its integration into Zeus Wallet (1 BTC).
Human-Readable Offers simplify Bitcoin payments by replacing complex Bitcoin addresses and invoices with user-friendly text. This is especially important for Lightning Network transactions, which currently involve a cumbersome process of generating invoices for each payment. With Human-Readable Offers, sending Lightning payments becomes as simple as sending an email (just by entering a username). This approach, similar to many fintech apps today, reduces errors, lowers the barrier to entry, increases trust, and is crucial for broader adoption of Bitcoin among new and seasoned users alike. It’s also important for people who don’t have access to smartphones and cannot copy and paste or use QR codes. Today, as a result of this bounty, Zeus users connected to a Core Lightning node can create a human-readable Bolt 12 offer to privately receive donations.
6. Self-Custodial Mobile Lightning Address
Winner: Evan Kaloudis for Zeus Wallet (1 BTC).
Activists, nonprofits, and content creators often use Lightning addresses to receive donations quickly and easily. However, setting up and managing a Lightning address presents a challenge: users have to choose between the self-sovereignty of managing their own web server (a complex process) or the convenience of a custodial service, which requires trusting a third party with their funds. This bounty directly addressed this issue. It allowed users of Zeus Wallet, one of the most popular self-custodial Bitcoin Lightning wallets, to easily and securely receive donations through a Lightning address while maintaining control of their funds.
7. Mobile Border Wallets
Winner: Bitcoin Tribe for their border wallet functionality, allowing users to create and memorize seeds without relying on written backups, and for building a React Native library, making it easier for other wallets to integrate this feature (2 BTC).
Mobile Border Wallets aimed to solve a critical problem with traditional Bitcoin seed phrase backups: they’re often written down on paper, making them susceptible to being lost, destroyed, or stolen. This makes securing a user’s Bitcoin a delicate balance between security and accessibility. It also makes it challenging, especially for activists or refugees who frequently cross international borders. Border Wallets offered a solution to this problem. Instead of writing down a 12- or 24-word seed phrase and finding a secure place to store it, users can upload a randomly generated grid of words to the cloud and memorize a pattern to secure their seed phrase, similar to a pattern a user would memorize and draw on an Android device to unlock it. This initiative resulted in a user-friendly mobile app that allowed users to create Border Wallets digitally, enhancing accessibility and offering an alternative to physical storage like printed paper or metal seed plates.
8. Easy Mobile Multisig
Winner: Bitcoin Keeper (1 BTC).
Multi-signature wallets allow multiple users to collaboratively control a Bitcoin wallet. This enhances security by requiring consensus before funds can be moved. Traditional multisig wallets often require physical hardware wallets or involve subscription fees, presenting a significant barrier for organizations exploring Bitcoin adoption. This bounty funded the development of easy mobile multisig functionality in the Bitcoin Keeper app, enabling users to set up a 2-of-3 multisig (requiring two out of three keys to authorize spending) to secure and manage their bitcoin. This is a great feature for activists to prevent government seizure of funds: even if one key holder gets detained, the funds are safe so long as the other two key holders are safe. The idea is to make sure two of the keys are held by entities outside of one’s country or threat zone.
9. FROST Multisig Wallet
Winner: CypherStack for Stack Wallet, which enables dynamic multisig using FROST, allowing users to modify signer sets without moving funds (1 BTC).
Multisig (multisignature) wallets require multiple signatures to authorize a transaction. This enhances security by distributing control over funds. However, traditional multisig setups — while secure — can be inflexible. If you need to change the set of signers, it often requires moving all the funds to a new multisig wallet with the updated signer set. This is burdensome, time-consuming, and incurs fees. FROST is a cryptographic protocol that offers significant advantages for multisig wallets. It provides dynamic multisig functionality, meaning users can easily adjust their signer sets as needed without affecting the funds within. This is an important functionality for nonprofits and civil society groups who often need to adjust their authorized signatories, especially in situations where a regime may seize a private key and that key then needs to be deprecated. This dynamic kind of secure setup is now available for activists to use on the Stack Wallet.
10. Cashu Upgrades
Winners: eNuts Wallet (0.5 BTC), Misovan for Minibits Wallet (0.5 BTC), Gandlaf for Proxnut (0.5 BTC), and Gandlaf for adding Cashu-TS restore functionality (0.5 BTC).
Cashu is a digital cash system designed for privacy and speed. It is like physical cash, but in digital form and uses blind signatures for private transactions. With Cashu, transactions are instant, low-fee, and can operate offline. There is no blockchain or transaction graph to be surveilled. Bounty recipients addressed critical aspects of usability and accessibility for Cashu tools: eNuts and Minibits Wallets brought Cashu to iOS and Android users worldwide, Proxnut enabled easy web integration for payments, and Cashu-TS Restore added crucial seed phrase backup. Together, these projects have taken Cashu from a more theoretical concept to a practical one and have been relevant for use cases like donations, content monetization, daily transactions, and cross-border payments.
11. BIP47 Expansion
Winner: Blue Wallet (0.5 BTC) for adding BIP 47 support.
BIP47 is a Bitcoin Improvement Proposal that enhances payment privacy for Bitcoin users. In Bitcoin, it’s generally considered bad privacy practice to reuse the same Bitcoin address for multiple transactions. It can link those transactions together and make it easier to track a user’s spending in high-risk environments. Generating a new address for each payment has become a common workaround, but this becomes cumbersome. BIP47 solves this with reusable payment codes. Users receiving funds generate a BIP47 payment code and share it with those who will be sending them payments. Each time a payment is initiated, a new, unused Bitcoin address is generated from the recipient’s payment code. This ensures every transaction uses a unique address. Blue Wallet received this bounty for integrating BIP47 support, making this important privacy enhancement accessible to its growing user base.
HRF’s Financial Freedom program educates activists worldwide, unites people from different industries and backgrounds, and makes grants in the service of advancing Bitcoin as a tool for human rights. To receive HRF’s weekly Financial Freedom Report, subscribe here.
For media inquiries or interview requests, please contact media @ hrf.org.
-
@ 19306922:c06688d2
2025-01-31 21:14:52At a time when data-gathering technologies are dominating all aspects of everyday life, governmental agencies such as The National Security Agency have considerable surveillance and control authority. The National Security Agency runs surveillance programs on not just violent international criminals, but also ordinary citizens within the country. A tremendous amount of effort is being made to keep these programs from being critiqued and shared with the public. In this paper, I will discuss whistleblowing and its relevance in establishing a more democratic structure in governmental institutions, through the cases of Edward Snowden and Thomas Drake. Firstly, I will emphasize Edward Snowden's action as an example of illegal whistleblowing and how he acts closer to civic disobedience rather than espionage. Following that, I will discuss Thomas Drake's espionage charge while legally criticizing The National Security Agency's programs and the inadequacy of whistleblower protection laws.
In our everyday lives, we come into contact with or utilize a variety of technological equipment such as security cameras, GPS devices, iris scanners, and so on. Everything we do, from buying things from shopping malls to searching for information on the internet, is kept in massive databases. Without even our knowledge, our data, which is vast enough to create our entire profile, is in the databases of a private firm or the government. That's why the surveillance network is getting bigger and bigger. Most of the surveillance tools and the capability to regulate these tools are under state control. The government also agrees with data aggregators -companies that collect data from multiple sources and make it available to customers in a value-added format- to access more data. The US Department of Justice has an $8 million agreement with data aggregator company ChoicePoint (Stanley, Steinhardt 2014). In this way, The Justice Department can access many civilians' information in the company's database. Although this surveillance mechanism seems to be an effective way to track and detect many illegal incidents such as terrorism, money laundering, etc., this surveillance network can easily be applied to ordinary civilians. For example, in 2002, Attorney General John Ashcroft released new domestic spy guidelines that dramatically expanded federal agents' ability to monitor on American civilians (Stanley, Steinhardt 2014). The American government also is running programs to spy on ordinary citizens, according to information obtained from the National Security Agency documents which leaked to the media on multiple occasions (Greenberg, 2013).
The National Security Agency (NSA) began as a cryptology-focused agency and has since grown into an intelligence agency that gathers data from enemies of the United States of America (Verble, 2014). The surveillance and data collection programs of NSA, however, are not carried out just to keep enemies at bay. Information on the NSA's programs was provided to the media by Thomas A. Drake, a senior executive at the NSA, and Edward J. Snowden, who also worked as a computer intelligence consultant at the NSA. As a result of all of these events, it is fairly obvious that the state and its institutions are conducting unethical surveillance to the civilians. However, the two people who raised awareness of this unethical operation by providing classified and declassified NSA documents to the media faced major crises. Both Thomas Drake and Edward Snowden faced charges under the Espionage Act. Despite the fact that two former NSA employees used different methods to prevent these surveillance programs, which were developed to spy on citizens using their taxes, both were charged with treason. In this article, I will discuss the whistleblowing act through Thomas Drake and Edward Snowden examples, as well as the significance of whistleblowing in inspecting institutions with tremendous authority, such as centralized databases. Whistleblowing is described as the act of an employee, typically within the organization, who reveals illegal, immoral, or inefficient information or actions within a private, public, or government institution. Daniel Ellsberg, one of the authors of the document, leaked information concerning the United States' political and military engagement in Vietnam between 1945 and 1967, also known as the Pentagon Papers. These papers, which revealed that the American government of the time did not accurately reflect information about Vietnam to the public, became the subject of the most well-known whistleblowing act in American history. Daniel Ellsberg faced charges under the Espionage Act (Greenberg, 2013). It is problematic to think that sharing the information with the public about crucial topics such as the state is systematically lying to the public or spying on them in a wide surveillance network is equated with espionage. The development of democratic regimes necessitates public debate and regulation of this type of government acts. I will demonstrate the significance through the examples of acts of Edward Snowden and Thomas Drake.
The Case of Edward Snowden
At one point, Edward Snowden's and Thomas Drake's whistleblowing actions differ. While Edward Snowden got confidential material from the NSA and shared it with the media directly, Thomas Drake initially attempted to prevent or regulate programs run by NSA from inside the organization by taking a legal path.
Firstly, using Edward Snowden as an example, I will evaluate the role of becoming an illegal whistleblower by sharing classified information with the public. Edward Snowden released highly classified information from NSA in 2013, revealing the NSA's surveillance operations with the cooperation of telecommunications companies and European governments. Snowden was charged under the Espionage Act and stealing government property by the US Department of Justice, and his passport was canceled by the Department of State. Not only that, the efforts were made to portray him as a traitor. Before leaking the information to the media, Edward Snowden was a 29-year-old consultant who worked for the NSA's Hawaii office and made $200,000 per year (Scheuerman, 2014). Snowden did not reveal this information to a country or organization that is hostile to the United States. He directly shared this material with the media, allowing the public to learn about these surveillance programs. He received no personal benefit from this act, and he risked himself and lost his privileged position in his life. Edward Snowden said to The Guardian reporters; “I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in.” He added: “My sole motive is to inform the public as to that which is done in their name and that which is done against them” (Glenn, 2013). Given all of this, Edward Snowden's actions are more similar to civic disobedience than treason or espionage (Scheuerman, 2014). As a United Nations citizen, Edward Snowden revealed to the public the wrongdoing of a governmental institution, making this situation questioned among the public. A democratic government gains from public criticism of its acts, which aids in the development of more ethical institutions. While it is a social benefit to inform the public about a massive government surveillance program, obtaining that information from the NSA and making it available to the public may also benefit the United States' enemies. Institutions also have the opportunity to develop and regulate these programs within their own walls, without any confidential information leaking out. Employees of the institution can file complaints to their supervisors and criticize these programs in a legal path, which is legal whistleblowing, however, in the case of Thomas Drake, we can see that legal whistleblowing puts people's lives at risk at least as much as the illegal version.
The Case Of Thomas Drake
On September 11, 2001, one of the most devastating days in American history, Thomas Drake began his job at the NSA. In the early years of the new millennium, when America was most vulnerable to external threats and digital data was growing exponentially, a program named Trailblazer caught Drake's attention. Drake saw the initiative as a huge budget waste that did not contribute to national security. He reported his critique to his supervisors, which is considered legal whistleblowing, but his attempts were unsuccessful. Finally, he decided to share his criticism with the media while remaining anonymous, although he did not share any confidential documents with the media. He only served declassified information, which conveys that Trailblazer was an ineffective project that wastes money. Drake was questioned by FBI investigators shortly after and accused of taking classified documents from the NSA. He faced charges of 35 years in jail time for 10 different crimes including the Espionage Act. The court dismissed the case in 2011, stating that the accusations were inappropriate and overstated, and Thomas Drake was sentenced to one year of probation. However, as a result of the entire process, Drake spent $82,000 on legal expenses, was dismissed from both his NSA and university positions, and lost his retirement (Greenberg, 2013). Thomas Drake's experience is an example of how even the slightest criticism of government institutions and their projects can have drastic consequences. The courage to criticize unethical projects is trying to be destroyed by this atmosphere of fear. The whistleblowers, whether they go the legal or illegal path, are aware that they will be prosecuted for espionage, loss of employment, and jail time.
At this juncture, I believe we should oppose the totalitarian positions adopted by the institutions, which have vast surveillance networks both domestically and internationally, and we should protect whistleblowers' rights. The United States has two legislations protecting whistleblowers, the Federal Whistleblower Protection Act of 1989 and the Whistleblower Protection Enhancement Act of 2012. According to a 2015 research, the Federal Whistleblower Protection Act of 1989 fails to protect whistleblowers. 79 percent of the 142 cases involving government ethics and administration ended in employee job loss. The Whistleblower Protection Enhancement Act of 2012 is also insufficient in terms of protections of whistleblowers (Peffer, Bocheko, Del Valle, Osmani, Peyton, Roman, 2015).
Conclusion
The whistleblowing contributes to public debate about the ethics of the state's programs. However, these organizations, which hold a vast surveillance network, damage the democratic process by raising severe allegations against whistleblowers in order to avoid the risk of limiting their authority. We can have an idea of how our data is gathered and used if we have laws and rules that protect whistleblowers. Accusing them with espionage and treason, on the other hand, will gradually create this environment of fear and, as a consequence, silence.
Reference Glenn G. (2013, Jun 11). Edward Snowden: the whistleblower behind the NSA surveillance revelations. The Guardian. Retrieved from https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance Greenberg, A. (2013). This machine kills secrets: Julian Assange, the Cypherpunks, and their fight to empower whistleblowers. Penguin. Scheuerman, W. E. (2014). Whistleblowing as civil disobedience: The case of Edward Snowden. Philosophy & Social Criticism, 40(7), 609-628. Stanley, J., & Steinhardt, B. (2014). Bigger monster, weaker chains: the growth of an American surveillance society. In Ethics and Emerging Technologies (pp. 269-284). Palgrave Macmillan, London. Peffer, S. L., Bocheko, A., Del Valle, R. E., Osmani, A., Peyton, S., & Roman, E. (2015).Whistle Where you work? The ineffectiveness of the Federal Whistleblower Protection Act of 1989 and the promise of the Whistleblower Protection Enhancement Act of 2012. Review of Public Personnel Administration, 35(1), 70-81. Verble, J. (2014). The NSA and Edward Snowden: surveillance in the 21st century. ACM SIGCAS Computers and Society, 44(3), 14-20.
-
@ a95c6243:d345522c
2025-01-31 20:02:25Im Augenblick wird mit größter Intensität, großer Umsicht \ das deutsche Volk belogen. \ Olaf Scholz im FAZ-Interview
Online-Wahlen stärken die Demokratie, sind sicher, und 61 Prozent der Wahlberechtigten sprechen sich für deren Einführung in Deutschland aus. Das zumindest behauptet eine aktuelle Umfrage, die auch über die Agentur Reuters Verbreitung in den Medien gefunden hat. Demnach würden außerdem 45 Prozent der Nichtwähler bei der Bundestagswahl ihre Stimme abgeben, wenn sie dies zum Beispiel von Ihrem PC, Tablet oder Smartphone aus machen könnten.
Die telefonische Umfrage unter gut 1000 wahlberechtigten Personen sei repräsentativ, behauptet der Auftraggeber – der Digitalverband Bitkom. Dieser präsentiert sich als eingetragener Verein mit einer beeindruckenden Liste von Mitgliedern, die Software und IT-Dienstleistungen anbieten. Erklärtes Vereinsziel ist es, «Deutschland zu einem führenden Digitalstandort zu machen und die digitale Transformation der deutschen Wirtschaft und Verwaltung voranzutreiben».
Durchgeführt hat die Befragung die Bitkom Servicegesellschaft mbH, also alles in der Familie. Die gleiche Erhebung hatte der Verband übrigens 2021 schon einmal durchgeführt. Damals sprachen sich angeblich sogar 63 Prozent für ein derartiges «Demokratie-Update» aus – die Tendenz ist demgemäß fallend. Dennoch orakelt mancher, der Gang zur Wahlurne gelte bereits als veraltet.
Die spanische Privat-Uni mit Globalisten-Touch, IE University, berichtete Ende letzten Jahres in ihrer Studie «European Tech Insights», 67 Prozent der Europäer befürchteten, dass Hacker Wahlergebnisse verfälschen könnten. Mehr als 30 Prozent der Befragten glaubten, dass künstliche Intelligenz (KI) bereits Wahlentscheidungen beeinflusst habe. Trotzdem würden angeblich 34 Prozent der unter 35-Jährigen einer KI-gesteuerten App vertrauen, um in ihrem Namen für politische Kandidaten zu stimmen.
Wie dauerhaft wird wohl das Ergebnis der kommenden Bundestagswahl sein? Diese Frage stellt sich angesichts der aktuellen Entwicklung der Migrations-Debatte und der (vorübergehend) bröckelnden «Brandmauer» gegen die AfD. Das «Zustrombegrenzungsgesetz» der Union hat das Parlament heute Nachmittag überraschenderweise abgelehnt. Dennoch muss man wohl kein ausgesprochener Pessimist sein, um zu befürchten, dass die Entscheidungen der Bürger von den selbsternannten Verteidigern der Demokratie künftig vielleicht nicht respektiert werden, weil sie nicht gefallen.
Bundesweit wird jetzt zu «Brandmauer-Demos» aufgerufen, die CDU gerät unter Druck und es wird von Übergriffen auf Parteibüros und Drohungen gegen Mitarbeiter berichtet. Sicherheitsbehörden warnen vor Eskalationen, die Polizei sei «für ein mögliches erhöhtes Aufkommen von Straftaten gegenüber Politikern und gegen Parteigebäude sensibilisiert».
Der Vorwand «unzulässiger Einflussnahme» auf Politik und Wahlen wird als Argument schon seit einiger Zeit aufgebaut. Der Manipulation schuldig befunden wird neben Putin und Trump auch Elon Musk, was lustigerweise ausgerechnet Bill Gates gerade noch einmal bekräftigt und als «völlig irre» bezeichnet hat. Man stelle sich die Diskussionen um die Gültigkeit von Wahlergebnissen vor, wenn es Online-Verfahren zur Stimmabgabe gäbe. In der Schweiz wird «E-Voting» seit einigen Jahren getestet, aber wohl bisher mit wenig Erfolg.
Die politische Brandstiftung der letzten Jahre zahlt sich immer mehr aus. Anstatt dringende Probleme der Menschen zu lösen – zu denen auch in Deutschland die weit verbreitete Armut zählt –, hat die Politik konsequent polarisiert und sich auf Ausgrenzung und Verhöhnung großer Teile der Bevölkerung konzentriert. Basierend auf Ideologie und Lügen werden abweichende Stimmen unterdrückt und kriminalisiert, nicht nur und nicht erst in diesem Augenblick. Die nächsten Wochen dürften ausgesprochen spannend werden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 000002de:c05780a7
2025-01-31 17:00:26Since the addition of cowboy credits on SN some have talked about how this is a mistake. CoinOS just announced an attack that exposed users accounts to compromise. I think the argument is to use cowboy credits on SN instead of these custodial wallets like Minibits or CoinOS because of the frequency of small transactions. That indeed is no doubt putting stress on these services. But, is this a reason to not use them.
I would actually like to hear from the devs on this one. I am using both of these services mostly to give them feedback, help they work out issues, and use the tools. I also use sovereign wallets and my own nodes. Is my use of these hosted NWC providers hurting these apps and their devs. My gut says no. My gut and experience tells me that there are certain issues an app/service is not aware of until actual real usage pressure is applied. Now, if too much pressure is applied to soon that can be very disruptive to the devs and their project.
Would love to hear from devs both working on Minibits and CoinOS on this but also any devs that do relevant work. I've worked in the field of hosted apps and web sites from over twenty years now. Scaling is not easy or cheap. IMO the Lightning network and eCash need to be stress tested. Not saying this as a slight but if the users of SN can take down a service it has a long way to go before bitcoin adoption even approaches 5%.
What am I missing? I'm sure I'm missing some things.
originally posted at https://stacker.news/items/871299
-
@ c68e2176:4439e6cf
2025-01-31 16:41:061:1 The record of the genealogy of Jesus the Messiah, the son of David, the son of Abraham: 2 Abraham was the father of Isaac, Isaac the father of Jacob, and Jacob the father of Judah and his brothers. 3 Judah was the father of Perez and Zerah by Tamar, Perez was the father of Hezron, and Hezron the father of Ram. 4 Ram was the father of Amminadab, Amminadab the father of Nahshon, and Nahshon the father of Salmon. 5 Salmon was the father of Boaz by Rahab, Boaz was the father of Obed by Ruth, and Obed the father of Jesse. 6 Jesse was the father of David the king. David was the father of Solomon by Bathsheba who had been the wife of Uriah. 7 Solomon was the father of Rehoboam, Rehoboam the father of Abijah, and Abijah the father of Asa. 8 Asa was the father of Jehoshaphat, Jehoshaphat the father of Joram, and Joram the father of Uzziah. 9 Uzziah was the father of Jotham, Jotham the father of Ahaz, and Ahaz the father of Hezekiah. 10 Hezekiah was the father of Manasseh, Manasseh the father of Amon, and Amon the father of Josiah. 11 Josiah became the father of Jeconiah and his brothers, at the time of the deportation to Babylon. 12 After the deportation to Babylon: Jeconiah became the father of Shealtiel, and Shealtiel the father of Zerubbabel. 13 Zerubbabel was the father of Abihud, Abihud the father of Eliakim, and Eliakim the father of Azor. 14 Azor was the father of Zadok, Zadok the father of Achim, and Achim the father of Eliud. 15 Eliud was the father of Eleazar, Eleazar the father of Matthan, and Matthan the father of Jacob. 16 Jacob was the father of Joseph the husband of Mary, by whom Jesus was born, who is called the Messiah. 17 So all the generations from Abraham to David are fourteen generations; from David to the deportation to Babylon, fourteen generations; and from the deportation to Babylon to the Messiah, fourteen generations. 18 Now the birth of Jesus Christ was as follows: when His mother Mary had been betrothed to Joseph, before they came together she was found to be with child by the Holy Spirit. 19 And Joseph her husband, being a righteous man and not wanting to disgrace her, planned to send her away secretly. 20 But when he had considered this, behold, an angel of the Lord appeared to him in a dream, saying, “Joseph, son of David, do not be afraid to take Mary as your wife; for the Child who has been conceived in her is of the Holy Spirit. 21 She will bear a Son; and you shall call His name Jesus, for He will save His people from their sins.” 22 Now all this took place to fulfill what was spoken by the Lord through the prophet: 23 “BEHOLD, THE VIRGIN SHALL BE WITH CHILD AND SHALL BEAR A SON, AND THEY SHALL CALL HIS NAME IMMANUEL,” which translated means, “GOD WITH US.” 24 And Joseph awoke from his sleep and did as the angel of the Lord commanded him, and took Mary as his wife, 25 but kept her a virgin until she gave birth to a Son; and he called His name Jesus.1:1 The record of the genealogy of Jesus the Messiah, the son of David, the son of Abraham:\ 2 Abraham was the father of Isaac, Isaac the father of Jacob, and Jacob the father of Judah and his brothers.\ 3 Judah was the father of Perez and Zerah by Tamar, Perez was the father of Hezron, and Hezron the father of Ram.\ 4 Ram was the father of Amminadab, Amminadab the father of Nahshon, and Nahshon the father of Salmon.\ 5 Salmon was the father of Boaz by Rahab, Boaz was the father of Obed by Ruth, and Obed the father of Jesse.\ 6 Jesse was the father of David the king.\ David was the father of Solomon by Bathsheba who had been the wife of Uriah.\ 7 Solomon was the father of Rehoboam, Rehoboam the father of Abijah, and Abijah the father of Asa.\ 8 Asa was the father of Jehoshaphat, Jehoshaphat the father of Joram, and Joram the father of Uzziah.\ 9 Uzziah was the father of Jotham, Jotham the father of Ahaz, and Ahaz the father of Hezekiah.\ 10 Hezekiah was the father of Manasseh, Manasseh the father of Amon, and Amon the father of Josiah.\ 11 Josiah became the father of Jeconiah and his brothers, at the time of the deportation to Babylon.\ 12 After the deportation to Babylon: Jeconiah became the father of Shealtiel, and Shealtiel the father of Zerubbabel.\ 13 Zerubbabel was the father of Abihud, Abihud the father of Eliakim, and Eliakim the father of Azor.\ 14 Azor was the father of Zadok, Zadok the father of Achim, and Achim the father of Eliud.\ 15 Eliud was the father of Eleazar, Eleazar the father of Matthan, and Matthan the father of Jacob.\ 16 Jacob was the father of Joseph the husband of Mary, by whom Jesus was born, who is called the Messiah.\ 17 So all the generations from Abraham to David are fourteen generations; from David to the deportation to Babylon, fourteen generations; and from the deportation to Babylon to the Messiah, fourteen generations.\ 18 Now the birth of Jesus Christ was as follows: when His mother Mary had been betrothed to Joseph, before they came together she was found to be with child by the Holy Spirit.\ 19 And Joseph her husband, being a righteous man and not wanting to disgrace her, planned to send her away secretly.\ 20 But when he had considered this, behold, an angel of the Lord appeared to him in a dream, saying, “Joseph, son of David, do not be afraid to take Mary as your wife; for the Child who has been conceived in her is of the Holy Spirit.\ 21 She will bear a Son; and you shall call His name Jesus, for He will save His people from their sins.”\ 22 Now all this took place to fulfill what was spoken by the Lord through the prophet:\ 23 “BEHOLD, THE VIRGIN SHALL BE WITH CHILD AND SHALL BEAR A SON, AND THEY SHALL CALL HIS NAME IMMANUEL,” which translated means, “GOD WITH US.”\ 24 And Joseph awoke from his sleep and did as the angel of the Lord commanded him, and took Mary as his wife,\ 25 but kept her a virgin until she gave birth to a Son; and he called His name Jesus.
-
@ 5d4b6c8d:8a1c1ee3
2025-01-31 16:28:47Here are today's picks using my proprietary betting strategy at Freebitcoin. For details about what Risk Balanced Odds Arbitrage is and why it works see https://stacker.news/items/342765/r/Undisciplined.
For a hypothetical 1k-ish wager on each match, distribute your sats as follows:
| Outcome 1 | Outcome 2 | Outcome 3 | Bet 1 | Bet 2 | Bet 3 | |--------------|-------------|--------------|-------|-------|-------| | Napoli| Udinese| Draw | 688| 125| 222| | Inter Milan| Fiorentina| Draw | 667| 133| 217| | Empoli| AC Milan| Draw | 200| 571| 250| | Como| Juventus| Draw | 279| 464| 286| | Sevilla| Barcelona| Draw | 174| 630| 222| | Real Sociedad| Espanyol| Draw | 660| 133| 238| | Real Madrid| Atletico Madrid| Draw | 565| 211| 263| | RB Leipzig| FC St Pauli| Draw | 652| 154| 217| | FC Bayern| Werder| Draw | 875| 53| 100| | Dortmund| VfB Stuttgart| Draw | 458| 313| 263| | Man City| Newcastle| Draw | 588| 213| 222| | Leicester| Arsenal| Draw | 100| 750| 167| | Everton| Liverpool| Draw | 125| 688| 200| | Brighton| Chelsea| Draw | 323| 421| 267|
Overall, I'm holding steady at about a 2.5% return with this approach.
I still haven't precisely identified where the threshold is, but it might be worth skipping any of these with a "time weight multiplier" lower than 90.
A note of caution about Freebitcoin: they recorded the wrong outcome for last week's Bills vs Ravens game and as of yet have not corrected it. I recall one other instance of something similar happening, so proceed with caution.
This RBOA strategy is largely immune from that problem, but be aware of it when just betting on one outcome.
originally posted at https://stacker.news/items/871258
-
@ 00c5889b:3ea163c2
2025-01-31 15:12:52Having been on #Nostr for the past two weeks or so full time, I have been appreciating the protocol more and more.
I am still learning how it functions and how it all comes together. I am willing to learn more about it the ins and outs of it.
I just wanted to shout all the hardworking DEVS and their Apps, Clients and desktop clients. Keep up the amazing work and keep up the amazing engagement.
-
@ 5d4b6c8d:8a1c1ee3
2025-01-31 14:44:46Now that the NFL season is over, we can turn our attention to other sports and next season.
Ongoing Contests - Criczap - UEFA - USA vs the world: I wonder what new and excited sport we'll get this week. - NBA Prediction Contest: Today's your last chance to make January changes. A lot of you still have Luka, who will not be eligible for end of season awards.
NFL Offseason News - The Bills season once again ended in a close game with the Chiefs, where the combination of better play and helpful officiating put the Chiefs over the top. - Most teams have landed their coaches - What's going to happen in Free Agency and the draft?
NBA News - Trade season is upon us and some big names are looking for new homes. Will anything happen, though? - Who are the top 10 players in the league? - Is Jokic the best player ever? https://stacker.news/items/861853/r/Undisciplined
NHL - Is Ovi still on track to become the all-time leading scorer? - Why does @grayruby despise his hometown Maple Leafs? (listener request)
Golf - TGL may have finally had a good match
WWE - Netflix hosted the Royal Rumble this year
Sports Betting - Predyx is back up and running
originally posted at https://stacker.news/items/871111
-
@ da0b9bc3:4e30a4a9
2025-01-31 14:00:57It's Finally here Stackers!
It's Friday!
We're about to kick off our weekends with some feel good tracks.
Let's get the party started. Bring me those Feel Good tracks.
Talk Music. Share Tracks. Zap Sats.
Let's go!
Come up and see me, make me smile!
https://youtu.be/dAoaVU3-ve0?si=JBdfGJhM05Qa_JeT
originally posted at https://stacker.news/items/871055
-
@ edeb837b:ac664163
2025-02-01 10:51:33In today’s fast-paced financial markets, having quick access to real-time data, trade insights, and the ability to share trades with a like-minded community is invaluable. That’s where NVSTly’s Discord bot comes in. It’s more than just a bot — it’s a powerful tool for social trading, designed to help traders and investors track their trades, share insights, and collaborate with others in real-time, all within Discord.
What the NVSTly Discord Bot Does
NVSTly’s Discord bot is built with the goal of making financial data and trading insights easily accessible to the entire trading community on Discord. Whether you’re a seasoned trader or just starting, the bot helps you stay on top of your trades and market trends. Some of the key features of the bot include:
- Real-Time Trade Tracking & Sharing: The bot tracks your trades and allows you to share them with others. Whether you’re trading stocks, options, forex, or cryptocurrencies, your trades are instantly shared with your followers and can be posted to social media or sent through Discord DMs or webhooks, fostering a transparent and collaborative environment.
- Trader Stats & Performance Recaps: The bot generates visual reports of your trading performance, including win rates, total gains, and individual trade stats. You can view a trader’s daily, weekly, or monthly recaps, complete with details on stock tickers, options info, and profit/loss calculations.
- Market Data & Charts: Get instant access to live market data, stock charts, and detailed information on tickers. The bot provides a variety of commands for stock price movements, charts, and other data, with plans to expand this to cover more markets in the future.
- Comprehensive Coverage: The bot currently supports stocks, options, forex, and crypto for trade tracking and sharing. Futures markets are also planned for the future. While the bot supports these markets for trade tracking, data-related features like market sentiment analysis or earnings reports will be available in the future.
How the Bot Integrates with NVSTly’s Social Trading App
The NVSTly Discord bot is fully integrated with the NVSTly social trading app, creating a seamless experience for users across platforms. Traders can track their trades on the app, and the bot will automatically share those trades directly with their followers, via DMs, social media, or webhooks. This integration means that everything you do on the NVSTly app can be easily shared with your community in real-time via Discord, making it simple to stay connected with your trading network.
The bot doesn’t just show trades — it also gives users insights into their trading performance and connects them with other traders for discussions, tips, and strategies. With NVSTly’s unique social features, traders can collaborate, share strategies, and learn from each other in a dynamic and interactive environment.
What’s Next for the NVSTly Discord Bot?
The future of the NVSTly Discord bot is incredibly exciting, with plans to add even more features designed to elevate the trading experience. Some of the upcoming features include:
- Expanded Market Coverage for Data Commands: In addition to stocks, the bot will soon offer data-related commands for crypto, forex, and futures markets. This will allow users to access even more comprehensive market data, including earnings reports, options flow, and more.
- AI & Machine Learning Integration: NVSTly plans to integrate AI and machine learning to generate trade signals, analyze market trends, and even offer personalized trading tips. This will help traders refine their strategies and make more informed decisions.
- Real-Time Alerts & Notifications: Users can already receive trade alerts sent directly to their DMs from traders they follow. In the future, users will also be able to set more customized alerts based on price targets or specific market activity.
Why the NVSTly Discord Bot is Perfect for Trading Communities
Discord has become a hub for traders and investors, and the NVSTly Discord bot takes full advantage of this by providing a platform where traders can interact, share trades, and learn from one another. The bot’s ability to instantly share trade recaps and stats creates an environment of transparency and collaboration. Traders can discuss strategies, ask questions, and even challenge each other to improve their performance.
By integrating market data, charts, and trade performance tracking, the bot offers a complete package for traders on Discord. It’s not just a tool for sharing trades — it’s a vital part of a thriving trading community.
Why NVSTly’s Discord Bot is the Fastest Growing Finance Bot on Discord
With its comprehensive features and seamless integration with the NVSTly app, the NVSTly Discord bot has quickly become the go-to tool for traders on Discord. What sets it apart from other finance bots is its focus on user engagement. The bot is not just about providing data — it’s about building a community of traders who can share their experiences, insights, and successes.
Traders have flocked to the NVSTly Discord bot because it provides real-time data, easy trade tracking, and powerful analytics — all in a user-friendly format. It’s no wonder it’s quickly becoming the fastest-growing finance bot on Discord.
On Track to be the Greatest Finance Bot on Discord
NVSTly is on track to become the greatest finance bot on Discord, if it’s not already. With plans for expanding market coverage, adding advanced AI-driven features, and constantly improving its user experience, the bot is poised to revolutionize the way traders use Discord.
By offering a comprehensive set of tools that integrate seamlessly with the NVSTly app, the bot is becoming an essential resource for traders who want to stay informed, track their performance, and engage with the trading community.
NVSTly is available for free on web, mobile devices (iOS & Google Play), and is fully integrated with Discord via a unique bot- the only of it’s kind and available to any server or trading community on Discord. Or feel free to join a community of over 45,000 investors & traders on our Discod server.
-
@ edeb837b:ac664163
2025-02-01 10:43:46Join Benzinga as they sit down with NVSTly, the cutting-edge platform revolutionizing social trading and investing. In this exclusive interview, NVSTly shares insights on empowering retail traders, fostering transparency, and building a thriving community for investors of all levels. Discover how NVSTly is shaping the future of trading with innovative features, real-time trade tracking, and global collaboration.
NVSTly Web: https://nvstly.com
iOS: https://nvstly.com/go/ios
Google Play: https://nvstly.com/go/android -
@ 54286b98:3debc100
2025-01-31 11:17:42Mornings are good; they are better than evenings (except for sunset views).\ Your body is recharged.\ The mind should be more at ease.\ Worries should be fewer, and breakfast is the only meal that is "served all day."
Waking up early—very early—was normal (at least for me) a lifetime ago.\ You get more things done,\ it’s quiet and free of distractions.\ So why don’t we just wake up early anymore?
It would be easy to blame responsibilities and being tired for why we can't wake up earlier,\ but that’s an easy way out.\ I believe we stop trying to beat the sun when two things happen to us:\ We lose a big motivator (being competitive, learning something, getting more done, spiritual time, etc.).\ We fall for comfort and a life without the demands of growth.\ Each one follows the other, like a dog chasing its tail.
Today marks almost day 30 of waking up really early again. I am happier, healthier, more connected with God, learning new things every day, playing my guitar, and writing more.
Until the next one,
J
Get my email newsletter or read my blog at javierfeliu.com (Soon will work on setting up specific #Nostr page.
An independent, publication about crafting beauty in life, family, entrepreneurship, culture, woodworking, and faith, written by Javier Feliu.
-
@ edeb837b:ac664163
2025-02-01 10:40:42We’re thrilled to announce that NVSTly has been honored with the People's Choice Award at the prestigious Benzinga FinTech Awards 2024! This recognition is a testament to the trust, support, and enthusiasm of our growing community of retail traders, investors, and financial enthusiasts.
A Milestone in Social Investing
Winning the People's Choice Award is more than just a moment of celebration for NVSTly—it reflects the incredible journey we’ve shared with our users. NVSTly was built with one mission in mind: to redefine social investing by empowering traders of all experience levels to share, track, and learn from one another.
In the competitive world of fintech, being selected as the People's Choice means we’ve created something that resonates deeply with our audience. It’s your votes, feedback, and passion that have propelled us to this achievement.
What Makes NVSTly Unique?
NVSTly stands out for offering a platform that’s entirely free while delivering a comprehensive suite of features for traders, such as:
- Global Leaderboard: Recognizing top-performing traders across stocks, options, futures, forex, and cryptocurrency.
- Trade Insights UI: Providing detailed analytics on trades, including market data validation and unique event visualizations.
- Broker Integration (Optional): Automating trade tracking and sharing with real-time updates.
- Discord Integration: A first-of-its-kind bot that brings NVSTly’s full functionality to one of the fastest-growing social platforms in finance.
- Education and Community: Enabling beginners to learn from experienced traders and find actionable insights.
Unlike traditional trading platforms, NVSTly focuses solely on trade tracking, sharing, and performance validation. It’s not about buying or selling real assets but fostering transparency, collaboration, and growth among traders.
Powered by the Community
The People's Choice Award is special because it comes directly from you—our community. Whether you’re an experienced trader gaining recognition through our leaderboard or a beginner exploring NVSTly to learn from top traders, this award proves that NVSTly isn’t just a platform; it’s a movement.
Your votes affirm our commitment to delivering cutting-edge features, unmatched usability, and an ecosystem that connects traders across all markets.
Looking Ahead
Winning this award fuels our determination to push boundaries even further. In the months to come, we’re excited to roll out new features, expand our broker integrations, and enhance the tools that make NVSTly the go-to platform for retail traders worldwide.
Thank You
We couldn’t have achieved this milestone without your unwavering support. From everyone at the NVSTly team, thank you for believing in our vision and making NVSTly the People’s Choice for 2024. This award is as much yours as it is ours.
If you haven’t joined the movement yet, there’s never been a better time. Discover, share, and track trades with NVSTly today—because the best way to grow in the markets is together.
Join NVSTly:
- Website: nvstly.com
- Mobile App: Available on Google Play and iOS App Store
- Discord Community: Join Now
Let’s continue shaping the future of social investing, one trade at a time.
-
@ da0b9bc3:4e30a4a9
2025-01-31 10:50:35Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/870889
-
@ edeb837b:ac664163
2025-02-01 10:36:38At NVSTly, we embrace the concept of “building in public.” This approach shapes how we develop, test, and roll out features, with the goal of making NVSTly the best social trading platform for our users. But what exactly does building in public mean for NVSTly? Let’s break it down.
Updates as They’re Finished
Instead of waiting to bundle new features and fixes into big, infrequent releases, we push updates as they’re completed. This ensures users benefit from improvements as soon as possible. However, our agile development style means you might notice subtle changes before they’re officially included in a published changelog. These incremental updates allow us to iterate and enhance the platform quickly.
Internal Testing, Real-World Feedback
Before any update reaches the production environment, our team conducts internal testing to ensure the new feature or fix works as intended. For example, a recent update to allow stats and daily/weekly recap commands to function with usernames containing spaces was thoroughly tested internally. Unfortunately, this change inadvertently broke compatibility with Discord IDs, highlighting the challenges of anticipating every edge case.
This is where building in public comes into play: while we strive for thorough testing, some issues only emerge when updates meet real-world usage. That’s why we rely on our vibrant user base to help us identify bugs, unintended behaviors, and areas for improvement.
The Role of Our User Community
Our users play a critical role in the development process. By using NVSTly in their daily trading workflows, they encounter scenarios that internal testing might miss. When users report bugs, glitches, or other issues, it provides us with invaluable insights into how the platform performs under various conditions.
If you ever experience something on NVSTly that doesn’t seem to work as expected, we encourage you to report it to us. Unlike platforms that may identify and resolve issues passively over time, NVSTly relies directly on user feedback to detect and prioritize fixes. Every report helps us improve.
Changelogs: A Snapshot of Progress
Given our frequent updates, we publish changelogs only after accumulating several changes or introducing major features. This means that when you see a changelog, many of the updates listed might have been implemented days or even weeks earlier. While this approach helps us focus on building and refining the platform, it’s another example of how building in public keeps the development process transparent.
Why Building in Public Matters
By building in public, we:
- Accelerate innovation: Continuous updates ensure the platform evolves rapidly.
- Foster transparency: Users gain insight into what’s changing and how issues are addressed.
- Strengthen collaboration: Feedback from users directly informs our priorities and solutions.
This approach isn’t without its challenges, but we believe the benefits far outweigh the risks. Building in public allows us to create a platform that truly meets the needs of our community — a community we’re proud to involve in the journey.
How You Can Help
If you notice a bug, glitch, or unintended behavior, please let us know right away. Your feedback is essential to making NVSTly better every day. Together, we’re not just building a platform; we’re building a community-driven experience that reflects the collective expertise and passion of its users.
Thank you for being part of the NVSTly journey. Let’s keep building — together.
NVSTly is available for free on web, mobile devices (iOS & Google Play), and is fully integrated with Discord via a unique bot- the only of it’s kind and available to any server or trading community on Discord. Or feel free to join a community of over 45,000 investors & traders on our Discod server.
-
@ f6488c62:c929299d
2025-01-31 09:24:18เมื่อชุมชนตั้งคำถามถึงการเป็นผู้นำ Ethereum Foundation
ช่วงนี้มีเสียงวิพากษ์วิจารณ์เกี่ยวกับการบริหารงานของ Ethereum Foundation (EF) มากขึ้น โดยเฉพาะเมื่อกลุ่มผู้ถือ Ether บางส่วนสนับสนุนให้ Danny Ryan ขึ้นเป็นผู้นำแทน Aya Miyaguchi ผู้อำนวยการบริหารคนปัจจุบัน การลงคะแนนเสียงแบบไม่เป็นทางการที่จัดโดย Fabrice Cheng ผู้ร่วมก่อตั้ง Quadrata พบว่ากว่า 99.98% ของผู้เข้าร่วมเห็นด้วยกับการเปลี่ยนแปลงครั้งนี้
แม้ว่าผลโหวตดังกล่าว ไม่มีผลทางกฎหมาย และไม่ได้เป็นส่วนหนึ่งของข้อเสนออย่างเป็นทางการของ EF แต่ก็ทำให้เกิดคำถามว่า Ethereum กำลังเผชิญปัญหาภายในหรือไม่? และ Vitalik Buterin จะยังคงนำโครงการต่อไปหรือเปล่า?
Vitalik กำลังถูกบีบให้ออก หรือเป็นเพียงเสียงสะท้อนจากชุมชน?
หลังจากกระแสเรียกร้องความเปลี่ยนแปลงเริ่มรุนแรงขึ้น Vitalik Buterin ได้ออกมายืนยันว่า เขายังคง เป็นผู้นำของเครือข่าย และการตัดสินใจสำคัญยังอยู่ในมือของเขา จนกว่าจะมีการจัดตั้งคณะกรรมการที่เหมาะสม พร้อมทั้งออกมาปกป้อง Aya Miyaguchi จากการถูกโจมตีในโลกออนไลน์
แม้ว่าเขาจะยังมีบทบาทสำคัญใน Ethereum แต่บางคนก็เริ่มตั้งข้อสงสัยว่า Vitalik อาจเริ่มหมดไฟกับ Ethereum แล้วหรือไม่? หรือเขากำลังเผชิญกับแรงกดดันจากทั้งภายในและภายนอก?
Vitalik จะขาย ETH และหันหลังให้ Ethereum หรือเปล่า?
แม้ว่า Ethereum Foundation กำลังอยู่ในช่วงของความขัดแย้ง แต่โอกาสที่ Vitalik จะลาออกจาก Ethereum นั้นยังคง ต่ำมาก ด้วยเหตุผลต่อไปนี้:
Ethereum เป็นเครือข่ายกระจายศูนย์ – แม้จะมีความขัดแย้งภายใน แต่โครงการไม่ได้ขึ้นอยู่กับตัวบุคคลเพียงคนเดียว
Vitalik ยังคงมีเป้าหมายสำคัญกับ Ethereum – เขายังคงผลักดัน Ethereum 2.0, Rollups, ZK-Proofs และ DeSci ซึ่งเป็นอนาคตของเครือข่าย
เขาไม่ได้เน้นเก็งกำไรจาก ETH – Vitalik เคยขาย ETH บางส่วนเพื่อระดมทุนพัฒนา Ethereum แต่ไม่เคยมีพฤติกรรมเทขายหนักจนทำให้ตลาดปั่นป่วน
Ethereum สามารถเดินหน้าต่อไปได้แม้ไม่มี Vitalik – คล้ายกับกรณีของ Apple ที่ยังแข็งแกร่งแม้ Steve Jobs ไม่อยู่แล้ว
ดังนั้น แม้ว่าเขาจะลดบทบาทของตัวเองลง แต่โอกาสที่เขาจะขาย ETH ทั้งหมดและตัดขาดจาก Ethereum อย่างสิ้นเชิงยังคงน้อยมาก
ถ้า Vitalik ออกจริง อะไรจะเกิดขึ้น?
หาก Vitalik ตัดสินใจออกจากโครงการ:
ETH อาจเผชิญแรงขายระยะสั้น เนื่องจากตลาดอาจเกิด FUD (Fear, Uncertainty, Doubt)
นักพัฒนาและชุมชน Ethereum จะต้องปรับตัว โดยอาจมีการตั้งคณะกรรมการใหม่มาดูแลโครงการแทน
ราคา ETH อาจลดลง 10-20% ในช่วงสั้น แต่ไม่ถึงกับล่มสลาย เนื่องจาก Ethereum มีเครือข่ายนักพัฒนาและระบบนิเวศที่แข็งแกร่ง
Ethereum ต้องการผู้นำ หรือชุมชนที่เข้มแข็ง?
แม้ว่าจะมีความขัดแย้งใน Ethereum Foundation แต่ Vitalik ยังคงมีบทบาทสำคัญและยังไม่ได้แสดงท่าทีว่าจะออกจากโครงการ ขณะที่ชุมชนบางส่วนต้องการเปลี่ยนแปลงโครงสร้างองค์กร
📌 โอกาสที่ Vitalik จะลาออกจาก Ethereum Foundation? → ต่ำ (~10-20%)📌 โอกาสที่เขาจะเทขาย ETH และหันหลังให้ Ethereum อย่างสิ้นเชิง? → ต่ำมาก (~5-10%)📌 โอกาสที่ Ethereum จะล่มสลายถ้า Vitalik ออก? → ต่ำ (~5%)
Ethereum อาจกำลังเผชิญความท้าทาย แต่โครงการนี้ยังคงแข็งแกร่ง และอาจต้องการ ชุมชนที่เข้มแข็งมากกว่าผู้นำเพียงคนเดียว 🚀
-
@ a012dc82:6458a70d
2025-01-31 09:16:28Bitcoin, as the pioneering cryptocurrency, heralded a new era in digital finance. It offered an innovative payment system, free from the control of traditional financial institutions and governments. This decentralized nature was a significant draw for many early adopters. Bitcoin Cash emerged from a split in the Bitcoin blockchain, a result of deep-seated disagreements within the Bitcoin community over its scalability and transaction processing efficiency. This split was not just technical but also ideological, marking a significant moment in the history of cryptocurrencies.
Table Of Content
-
The Genesis of Bitcoin Cash
-
Technological Divergence: Block Size and Scalability
-
Segregated Witness (SegWit) and Bitcoin
-
Market Impact and Adoption
-
Transaction Processing: Speed and Fees
-
The Forks and Future Directions
-
Usability and Real-World Applications
-
Supply Dynamics
-
Bitcoin Cash as a Medium of Exchange
-
Conclusion
-
FAQs
The Genesis of Bitcoin Cash
The creation of Bitcoin Cash in 2017 was a pivotal event in the cryptocurrency world. It was a direct response to the growing concerns over Bitcoin's ability to handle an increasing volume of transactions. The proponents of Bitcoin Cash argued that changes were necessary to fulfill the original vision of a fast, scalable, and low-cost digital payment system. This led to the hard fork, a move that created a new blockchain with different rules, fundamentally diverging from the original Bitcoin protocol.
Technological Divergence: Block Size and Scalability
The debate over block size is central to the divergence between Bitcoin and Bitcoin Cash. Bitcoin's original 1 MB block size was seen as a significant bottleneck, leading to slower transaction times and higher fees during peak usage. In contrast, Bitcoin Cash's decision to increase the block size to 8 MB and later to 32 MB was a bold move aimed at addressing these issues. This increase was a fundamental shift, intended to allow more transactions per block and, consequently, faster processing and lower fees.
Segregated Witness (SegWit) and Bitcoin
The implementation of Segregated Witness (SegWit) in Bitcoin was a landmark technological upgrade. SegWit aimed to optimize the space within each block by segregating the digital signature information, which accounts for a significant portion of the data in a transaction. This was a sophisticated solution to the scalability issue, differing fundamentally from Bitcoin Cash's approach of simply increasing the block size. SegWit represented a philosophical as well as a technical divergence in the approach to scaling Bitcoin.
Market Impact and Adoption
The market dynamics of Bitcoin and Bitcoin Cash tell a story of divergent paths. Bitcoin, with its higher market capitalization, remains the more dominant and widely recognized cryptocurrency. Its position as the first and most established cryptocurrency has given it a significant advantage in terms of adoption and market presence. Bitcoin Cash, while substantial in its market cap, has not reached the same level of market penetration. This difference in market impact reflects the varying degrees of acceptance and trust among investors and users in the cryptocurrency community.
Transaction Processing: Speed and Fees
The practical implications of the differences between Bitcoin and Bitcoin Cash are most evident in transaction processing. Bitcoin Cash, with its larger block size, theoretically offers faster transaction times and lower fees, making it more suitable for frequent, small transactions. However, the actual efficiency gains of Bitcoin Cash are subject to debate, as the network has not been tested under the same transaction volume as Bitcoin. This difference in transaction processing capabilities is a critical factor in the user's choice between the two cryptocurrencies.
The Forks and Future Directions
The evolution of Bitcoin and Bitcoin Cash is marked by continuous development and occasional forks. The creation of Bitcoin SV from Bitcoin Cash is an example of ongoing disagreements within the community about the best path forward. These forks are not just technical events but also represent differing visions and philosophies within the cryptocurrency community. They reflect the dynamic and often contentious nature of the development of blockchain technology and its applications.
Usability and Real-World Applications
In terms of real-world usability, Bitcoin and Bitcoin Cash cater to slightly different needs. Bitcoin's widespread recognition and higher value make it more popular as a digital asset for investment. In contrast, Bitcoin Cash, with its focus on transaction efficiency, aims to be more practical for everyday transactions. However, the actual adoption of Bitcoin Cash for daily transactions has been slower than anticipated, partly due to the entrenched position of Bitcoin and the rapidly evolving landscape of digital payments.
Supply Dynamics The supply mechanics of both Bitcoin and Bitcoin Cash mirror the principles of scarcity and controlled supply inflation. This approach is akin to precious metals, where the limited supply is a key factor in value preservation. The halving events, where the reward for mining new blocks is halved approximately every four years, are critical moments in the life cycle of both cryptocurrencies. These events are closely watched by investors and users alike, as they have implications for the supply and, potentially, the value of these digital currencies.
Bitcoin Cash as a Medium of Exchange
Bitcoin Cash's design as a medium of exchange is one of its defining features. It aims to provide a digital equivalent of cash, facilitating quick and low-cost transactions. This focus on usability for everyday transactions is a key differentiator from Bitcoin, which has become more of a store of value or "digital gold." The success of Bitcoin Cash in this regard depends on broader adoption and recognition, which is an ongoing challenge in the competitive landscape of digital currencies.
Conclusion The story of Bitcoin and Bitcoin Cash is a fascinating chapter in the evolution of digital currencies. Both emerged from the same origin but have since traveled distinct paths, shaped by differing philosophies, technological choices, and community dynamics. As the cryptocurrency landscape continues to evolve, the trajectories of Bitcoin and Bitcoin Cash will offer valuable insights into the challenges and opportunities of blockchain technology and digital finance.
FAQs
What is the main difference between Bitcoin and Bitcoin Cash? The primary difference lies in their block size. Bitcoin has a block size of 1 MB, while Bitcoin Cash increased its block size initially to 8 MB and later to 32 MB, aiming for faster transaction processing and scalability.
Why was Bitcoin Cash created? Bitcoin Cash was created in 2017 due to a split in the Bitcoin community. The split occurred over disagreements on how to scale the network, with Bitcoin Cash proponents advocating for larger block sizes to improve transaction speed and reduce fees.
Can Bitcoin and Bitcoin Cash be used interchangeably? No, they are separate cryptocurrencies with different blockchains. They cannot be used interchangeably.
Is Bitcoin Cash faster than Bitcoin? Theoretically, yes. Due to its larger block size, Bitcoin Cash can process transactions faster than Bitcoin. However, the actual speed can vary based on network congestion and usage.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
X: @croxroadnews.co
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 5188521b:008eb518
2025-01-31 08:38:47Photo by Pavel Danilyuk
In the last four years, I’ve ridden the wave of social media. I’ve amassed thousands of followers, and my posts were read by millions.
It’s empowering… until it isn’t.
This year, I chose to stop publishing on LinkedIn, Medium, Facebook, Instagram, and Threads. My reach on each of these platforms dropped from 100% of my follower base to around 10%. My voice was being suppressed.
I wasn’t writing anything particularly controversial. This is all just part of the social media life cycle. Platforms offer attractive terms to lock in users. They distribute our articles, posts, and thoughts widely to attract eyeballs for advertisers.
Writers learn to play the algorithm to maximise reach and engagement. Maybe they even manage to monetize their writing.
But when the platforms reach what they deem to be maximum usage and membership, they begin to reduce the benefits on offer. They ask writers to focus on specific topics, suppress non-mainstream opinion, or punish or ban any writers who don’t follow new rules. Big tech companies always eventually turn on the money tap by forcing users to suffer endless adverts and even make writers pay to reach the audience they have built.
Newsflash: there is no company too big to fail. Digg, Google+, Myspace, Vine and many more socials have died. Self-reported active user numbers cannot be trusted. Meta recently trialed AI profiles to prop up falling usage projections on Instagram and Facebook. X is now a dumpster fire of bots, scammers, and rage bait. It has been co-opted by a megalomaniacal oligarch to spread his own worldview. And LinkedIn feeds are drowning in unsolicited AI-generated business twaddle. The social giants are entering the death spiral.
What happens in a social-media death spiral?
Users don’t see the value in posting, so they move elsewhere.
I wasn’t feeling rewarded for the thousands of hours I spent on LinkedIn, so I quit. I went from earning $20+ an article on Medium to pennies. Literal pennies. Bye bye, Tony Stubblebine. I learned that if you don’t own the distribution mechanic, you get left writing into the wind.
Ultimately, writers will dedicate their energy to where they see a benefit. They should spend time and create value in the place most similar to their ideal world.
For writers in 2025, that place seems to be Substack. Open rates are high and the platform is adding social features to generate more engagement in app. Substack is experiencing massive growth in active (and paid) subscriptions. Yet, it is following the same pattern as Medium in and LinkedIn in become self-cannibalising. Many of the most popular accounts write about ‘how to grow’ or ‘how to make money’ on Substack. Queue the eye rolls.
For me, it’s not the promised land where writers can earn a living. Of course, it’s no walk in the park to earn paid subscribers. Further, Substack users can only receive payment via Stripe. This excludes writers from 149 of the World’s countries. Does that seem open and fair to you?
Even with all this going on, there is a much bigger factor that should influence your choice of platform — ownership.
Do writers really own their words?
Who reads the terms and conditions? Nobody. That’s who.Writers (including me) rush to all platforms which promise to give us benefits such as pay, distribution, and audience growth.
In exchange, companies request access to and shared ownership of our content. They can use our words to train LLMs, analyse trends, repurpose, and to spy on us.
Governments can and will request access to social media profiles. They seek to control the use of those platforms. Founders and CEOs who refuse to comply may be held personally accountable and put on trial, just as Telegram founder, Pavel Durov, was in France. Big tech owns our content, and governments threaten platforms into obedience.
As much as it benefits society to suppress harmful or dangerous content, companies simply can’t be censors 24/7. Growing platforms like Bluesky are already struggling to moderate content effectively. Without a strong economic incentive to moderate, companies will simply refuse to do it (as long as the threat of criminal charges does not prevail).
To sum up: No privately owned social media network offers writers the opportunity to own and distribute their work in order to receive a fair and equitable benefit.
Enter NOSTR…
Decentralizing Social Media
Notes and Other Stuff Transmitted by Relays (NOSTR) is not a platform; it’s an open protocol.
By signing messages with their private keys (a long string of characters), users generate “events”. These events (messages/updates/media/transactions) are then broadcast through a series of “relays.”
Developers can use the protocol to build various applications that retrieve and distribute these events to other users. These ‘clients’ can range from microblogging sites like X and long-form distributors like Substack to visual media platforms like Instagram. Plus, NOSTR is also a whole lot more than that (but this is a topic for another day).
Decentralized tools offer the only hope against the dominance of AI and big tech in a top-down autocratic system designed to control us more than the thought police ever could.
Diagram courtesy of River.
So why should writers opt out of their big audience pool to write on some ‘protocol’?
Ownership, fair rules, and fair value.
- Ownership:
While privately run corporations can suppress the ideas they want, NOSTR provides a censorship-resistant alternative. No individual actors can restrict content or accounts.
Your private keys provide permanent access to the messages you have signed. No one else has access to them. And while some clients provide a delete function, there is no way to force all relays to respect a delete request. Not only do writers own what they publish, but it’s a permanent record.
- Rules:
Traditional social media platforms use proprietary algorithms to curate and order our feeds. NOSTR has no algorithm. NOSTR clients display messages chronologically or based on user-defined criteria, removing the influence of opaque algorithms that could manipulate user engagement and visibility of posts.
Put simply, distribution and consumption is down to the user, not to the creator or the platform. And everyone works to the same rules.
- Value:
Harmful content and spam affect all of us. There is no way to stop malicious content from being published on NOSTR, but two factors control its consumption.
- Clients are experimenting with strategies such as requiring proof-of-work with each note or requiring verification badges.
- Quality control is enforced by the value transferred by the protocol.
Bitcoin micropayments have become the monetary lifeblood flowing in the decentralized world. The ability to ‘zap’ users actual monetary value (e.g. a few cents) provides a clear display of which messages are valuable and which are unwanted. In time, as more users adopt the mechanic of value transfer, spammers will see their approach is not bearing fruit.
The beauty of using bitcoin in this way is twofold. Firstly, it is truly equitable — anyone in the world can receive it instantly and it cannot be stopped. And the system of frictionless micropayments offers content creators (artists, podcasters, musicians, writers) a way to earn money for the value they produce. Put simply, this could save creativity from doom.
Think people still want all content for free? Think again. Try zapping a writer from the Philippines, an artist from Peru, a Congolese musician, or a poet from Poland to show them you enjoyed what they produced. THAT is truly empowering.
Not convinced?
The best thing about NOSTR for writers is that you are early.
By being an early adopter with a low time preference, you can build a sizeable audience as new users discover the protocol.
Of course, topics like bitcoin, freedom tech, and privacy are well covered, but if you write in another niche, you could be ‘quids in’.
Conclusion:
By adopting a long-term strategy and sticking to their principles, readers, writers and all other creatives can build a better world on social media. It doesn’t matter that it is imperfect. There will always be flaws in any society. But decentralized protocols like NOSTR can offer writers what they truly want — ownership, fair rules, and fair value.
Philip Charter is a totally human writer who helps bitcoin-native companies and clients stack major gains through laser-focused content. Find out more at totallyhumanwriter.com
He is also the editor of the cypherpunk and freedom fiction project, 21 Futures.
-
@ ee7e3590:5602f192
2025-02-01 05:02:15You’re hitting on the core tension: unlimited demand for emergency care collides with finite resources, and pretending otherwise leads to either runaway costs or rationing-by-stealth. Let’s confront this head-on with free-market-aligned solutions that don’t ignore human realities:
1. Redefine "Emergency Care"
The U.S. legally mandates ERs to stabilize anyone, regardless of ability to pay (EMTALA). This creates moral hazard:
- Problem: Hospitals inflate prices on paying patients to offset uncompensated care.
- Free-Market Fix:
- Repeal EMTALA: Allow ERs to refuse non-critical cases (e.g., toothaches, rashes) unless prepaid or insured.
- Clarify "True Emergency": Legally define emergencies as immediate life threats (e.g., strokes, cardiac arrest) and let non-critical cases be diverted to urgent care.
- Consequence: ERs could price transparently for true emergencies, while non-critical cases face market-driven urgent care options.
2. Embrace Tiered Emergency Care
Not all emergencies require Level I trauma centers:
- Basic ERs: Staffed by NPs and paramedics for minor injuries (e.g., sprains, minor burns) at lower costs.
- Advanced ERs: For critical care (e.g., gunshot wounds), priced higher but competing via outcomes (e.g., survival rates).
- Example: India’s Ziqitza Healthcare operates ambulance tiers—basic vans for transport and advanced ICU units.
3. Address Moral Hazard with Insurance Innovation**
- Catastrophic Insurance Mandates: Require everyone to carry cheap, high-deductible plans covering only true emergencies (e.g., $10/month for coverage above $50k).
- Incentivizes price shopping for non-emergencies.
- Prevents freeloading on ERs.
- Risk-Adjusted Premiums: Smokers, skydivers, or diabetics pay higher premiums, aligning costs with personal choices.
4. Community-Based Safety Nets**
- Mutual Aid Networks: Local groups negotiate bulk ER rates (e.g., $100/month membership covers three ER visits annually).
- Crowdfunding ER Vouchers: Platforms like GoFundMe could partner with hospitals to prepurchase discounted emergency care slots.
5. Radical Transparency + Bankruptcy Reform**
- ER Debt Auctions: Let hospitals sell unpaid ER bills to collection agencies in real-time, creating competition to minimize patient liability.
- Flat-Fee ER Pricing: Hospitals post rates like “$5,000 for appendicitis stabilization, all-inclusive” to deter surprise billing.
- Ban Wage Garnishment for Medical Debt: Protect patients from lifelong ruin, forcing hospitals to price responsibly or absorb losses.
6. Accept Trade-Offs Explicitly**
The U.S. system fails because it hides rationing behind complexity. A free-market approach must embrace transparency:
- Option 1: Pay $100,000 for a 95% survival rate in a car crash.
- Option 2: Pay $20,000 for a 70% survival rate at a budget ER.
- Brutal but Honest: Let individuals (or insurers) choose their risk tolerance upfront.Example:
- Japan’s Price Controls: Caps ER costs but tolerates wait times (e.g., 8+ hours for non-critical care).
- Switzerland’s Mandates: Everyone buys insurance, but ERs charge $1,000+ deductibles to deter overuse.
7. Disrupt with Decentralized Care**
- Crypto-ERs: Blockchain-based emergency funds where contributors vote on covering members’ bills.
- AI-Guided Self-Care: Apps that stabilize patients en route to ERs (e.g., tourniquet tutorials, overdose reversal guidance).
8. Reform Malpractice to Reduce Defensive Medicine**
- “No Pay, No Harm” Liability: If a patient doesn’t pay, they can’t sue for malpractice (incentivizing upfront pricing).
- Safe Harbor Protocols: ERs using approved, cost-effective treatments (e.g., generics) get immunity from lawsuits.
The Uncomfortable Truth
A free market in emergency care requires accepting that not everyone will be saved—just as not everyone can afford a Ferrari. The alternative is the current U.S. model, which pretends to save everyone but bankrupts millions and still leaves 30% of ER visits unmet due to overcrowding.
By legalizing tiered care, deregulating monopolies, and forcing transparency, you create a system where:
- Elites pay premium prices for cutting-edge emergency care.
- Most get “good enough” stabilization at reasonable costs.
- Some choose cheap, high-risk options (or none at all).This isn’t pretty, but it’s honest—and arguably more ethical than today’s hidden rationing and financial toxicity.
-
@ da18e986:3a0d9851
2025-01-31 08:27:34Large Language Models (LLMs) have revolutionized how we interact with artificial intelligence, and one of their most powerful features is tool use - the ability to execute external functions to accomplish tasks. However, the current paradigm of LLM tool use remains largely constrained within closed ecosystems. Data Vending Machines (DVMs) offer an alternative to local, built-in tools through a decentralized marketplace. This decentralized approach enables independent developers to continuously create new tools, letting the entire system evolve based on actual needs.
Understanding LLM Tool Use
Tool use, also known as function calling, enables LLMs to interact with external systems and APIs. Instead of simply generating text, an LLM can choose to execute predefined functions when appropriate. For example, when asked about the weather, rather than making up a response, the model can call a weather API to get accurate, real-time data.
Traditionally, these tools are implemented as a fixed set of functions within the application's tech stack:
```python
Traditional function calling example (this exists within a closed tech stack)
def get_weather(location: str, date: str) -> dict: """Get weather information for a specific location and date.""" api_key = os.environ["WEATHER_API_KEY"] return weather_api.fetch(location, date, api_key)
LLM would call this function like:
result = get_weather("San Francisco", "2024-01-31") ```
Enter Data Vending Machines
DVMs represent a paradigm shift in how we think about LLM tool use. Instead of relying on locally defined functions, DVMs provide a decentralized marketplace of capabilities that any LLM can access. These "functions" exist as independent services on the Nostr network, available to anyone willing to pay for their use.
Here's how a DVM call might look compared to a traditional function call:
```json
partial data of an example call to a weather DVM
{ ... "kind": "5493", "pubkey": "
", "tags": [ ["payment", "100", "sats/ecash"] ], "content": { "service": "weather", "params": { "location": "San Francisco", "date": "2024-01-31" } } ... } ``` Note: This is a motivating example. Weather data DVMs don't exist yet. Most DVM requests don't include payment up front, but with ecash and zaps, it is possible to do. The format of the params may differ as well.
The Power of Market Dynamics
What makes DVMs particularly compelling for LLM tool use is their market-driven nature:
-
Competition Drives Innovation: Multiple DVMs can offer similar services, competing on price, quality, and speed. This natural competition leads to better services and lower prices.
-
Dynamic Expansion: Unlike traditional tool use where new capabilities must be explicitly added to the system, DVM-enabled LLMs can discover and utilize new tools as they become available in the marketplace.
-
Economic Incentives: DVM operators are incentivized to create and maintain high-quality services through direct monetary compensation.
Implementation Architecture
A basic implementation of a user facing DVM-based Tool Use LLM might include:
- Manager DVM: Acts as the central coordinator, maintaining:
- Conversation state and history
- System prompts and user preferences
- Wallet for handling payments to DVMs
-
Logic for DVM discovery and selection
-
User Interface: A chat interface that communicates with the manager DVM
-
LLM Service: Handles the core language model capabilities and decision-making about when to use DVMs
-
DVM Registry: Maintains a directory of available DVMs and their capabilities (like the data available on DVMDash; see nostr:naddr1qvzqqqr4gupzpkscaxrqqs8nhaynsahuz6c6jy4wtfhkl2x4zkwrmc4cyvaqmxz3qqxnzdejxv6nyd34xscnjd3sz05q9v)
Advanced Capabilities
The true power of DVM-based tool use emerges when we consider advanced scenarios:
- Self-Expanding Capabilities: When an LLM encounters a request it can't fulfill with existing DVMs, it could:
- Create bounties for new DVM development
- Fund the development of new capabilities
-
Coordinate with multiple DVMs to compose novel solutions
-
Economic Agency: By maintaining its own wallet, the system can:
- Generate revenue from user requests
- Pay for DVM services
- Fund its own expansion and improvement
Safety and Control
While the open nature of DVMs might raise concerns, several safety mechanisms can be implemented:
-
Human-in-the-Loop Confirmation: Users must approve DVM calls before execution, similar to how CLI tools ask for confirmation before significant actions.
-
Reputation Systems: DVMs can build reputation scores based on successful transactions and user feedback.
-
Cost Controls: Users can set spending limits and approve budgets for specific tasks.
Implications and Future Potential
The combination of Tool Use LLMs and DVMs creates a powerful new paradigm for AI capabilities:
-
Democratized Innovation: Anyone can create and monetize new AI capabilities by launching a DVM.
-
Organic Growth: The system can evolve based on real user needs and market demands.
-
Economic Sustainability: The payment mechanism ensures sustainable development and maintenance of AI tools.
Conclusion
By leveraging the Nostr protocol, DVMs enable Tool Use LLMs to access a distributed network of capabilities that would be impossible to build in a traditional, centralized way. For example, a single LLM can seamlessly use specialized tools from hundreds of independent developers - from a service that matches local freelancers to jobs to one that indexes local community events - without any prior coordination. This creates an AI ecosystem where capabilities emerge through market demand rather than central planning, with developers anywhere in the world able to add new tools that every LLM can discover and use.
-
-
@ 19fd5e65:946640b2
2025-01-31 08:04:34Согласно новому исследованию Workplace Intelligence и Международной бизнес-школы Hult, работодатели скептически настроены по отношению к выпускникам вузов. 37% опрошенных работодателей предпочли бы нанять робота или ИИ, чем недавнего выпускника колледжа. Эта поразительная статистика отражает растущую озабоченность по поводу готовности молодых специалистов к работе и проливает свет на меняющиеся ожидания работодателей.
Почему работодатели скептичны?
96% руководителей HR считают, что вузы не готовят студентов должным образом к современным реалиям рынка труда. 89% работодателей признались, что активно избегают найма недавних выпускников из-за отсутствия у них практического опыта, недостатка soft skills, таких как коммуникация и умение работать в команде, и даже базовых знаний делового этикета.
Этот разрыв между вузами и бизнесом приводит к необходимости дорогостоящего обучения и адаптации новых сотрудников. По оценкам HR-специалистов, они могли бы сэкономить более 4500 долларов на каждого сотрудника, если бы кандидаты были готовы к работе с первого дня. На рынке труда, где ценится эффективность, этот пробел в готовности делает ИИ или другие альтернативы более привлекательными.
Кризис доверия и сожаления о выборе
Результаты исследования также отражают кризис доверия среди самих выпускников. 77% опрошенных заявили, что узнали больше за первые шесть месяцев работы, чем за все время обучения в бакалавриате, а 55% считают, что их образование вообще не подготовило их к работе. Почти все выпускники (94%) сожалеют о выборе специальности, причем 43% считают, что это негативно повлияло на их карьерные перспективы и финансовое будущее.
Что это значит для работодателей и вузов?
Для работодателей предпочтение ИИ новым выпускникам подчеркивает необходимость срочных изменений в подходе компаний и образовательных учреждений к подготовке молодых специалистов. Хотя ИИ может обеспечить эффективность, ему не хватает креативности, адаптивности и эмоционального интеллекта, присущих людям. Это подтверждает важность разработки программ, которые помогают выпускникам приобретать не только технические навыки, но и soft skills, которые работодатели ценят превыше всего.
Опрошенные HR-руководители подчеркнули необходимость таких навыков, как коммуникация (98%), сотрудничество (92%) и критическое мышление (87%). Сотрудничая с вузами для разработки более практичных учебных программ, ориентированных на навыки, или инвестируя в комплексные программы адаптации, работодатели могут помочь преодолеть разрыв в готовности, а не обходить его с помощью ИИ.
Исследование Workplace Intelligence и Hult дает четкий вывод: как образовательные учреждения, так и работодатели должны адаптироваться, чтобы подготовить молодых специалистов к быстро меняющемуся рынку труда. Для вузов это означает включение в учебные программы реальных задач, обучения работе с ИИ и коучинга. Для работодателей это означает поиск баланса между краткосрочной эффективностью и долгосрочным развитием, чтобы использовать весь потенциал следующего поколения работников.
-
@ ee7e3590:5602f192
2025-02-01 05:00:39You’re hitting on the core tension: unlimited demand for emergency care collides with finite resources, and pretending otherwise leads to either runaway costs or rationing-by-stealth. Let’s confront this head-on with free-market-aligned solutions that don’t ignore human realities:
1. Redefine "Emergency Care"
The U.S. legally mandates ERs to stabilize anyone, regardless of ability to pay (EMTALA). This creates moral hazard:
- Problem: Hospitals inflate prices on paying patients to offset uncompensated care.
- Free-Market Fix:
- Repeal EMTALA: Allow ERs to refuse non-critical cases (e.g., toothaches, rashes) unless prepaid or insured.
- Clarify "True Emergency": Legally define emergencies as immediate life threats (e.g., strokes, cardiac arrest) and let non-critical cases be diverted to urgent care.
- Consequence: ERs could price transparently for true emergencies, while non-critical cases face market-driven urgent care options.
2. Embrace Tiered Emergency Care
Not all emergencies require Level I trauma centers:
- Basic ERs: Staffed by NPs and paramedics for minor injuries (e.g., sprains, minor burns) at lower costs.
- Advanced ERs: For critical care (e.g., gunshot wounds), priced higher but competing via outcomes (e.g., survival rates).
- Example: India’s Ziqitza Healthcare operates ambulance tiers—basic vans for transport and advanced ICU units.
3. Address Moral Hazard with Insurance Innovation**
- Catastrophic Insurance Mandates: Require everyone to carry cheap, high-deductible plans covering only true emergencies (e.g., $10/month for coverage above $50k).
- Incentivizes price shopping for non-emergencies.
- Prevents freeloading on ERs.
- Risk-Adjusted Premiums: Smokers, skydivers, or diabetics pay higher premiums, aligning costs with personal choices.
4. Community-Based Safety Nets**
- Mutual Aid Networks: Local groups negotiate bulk ER rates (e.g., $100/month membership covers three ER visits annually).
- Crowdfunding ER Vouchers: Platforms like GoFundMe could partner with hospitals to prepurchase discounted emergency care slots.
5. Radical Transparency + Bankruptcy Reform**
- ER Debt Auctions: Let hospitals sell unpaid ER bills to collection agencies in real-time, creating competition to minimize patient liability.
- Flat-Fee ER Pricing: Hospitals post rates like “$5,000 for appendicitis stabilization, all-inclusive” to deter surprise billing.
- Ban Wage Garnishment for Medical Debt: Protect patients from lifelong ruin, forcing hospitals to price responsibly or absorb losses.
6. Accept Trade-Offs Explicitly**
The U.S. system fails because it hides rationing behind complexity. A free-market approach must embrace transparency:
- Option 1: Pay $100,000 for a 95% survival rate in a car crash.
- Option 2: Pay $20,000 for a 70% survival rate at a budget ER.
- Brutal but Honest: Let individuals (or insurers) choose their risk tolerance upfront.Example:
- Japan’s Price Controls: Caps ER costs but tolerates wait times (e.g., 8+ hours for non-critical care).
- Switzerland’s Mandates: Everyone buys insurance, but ERs charge $1,000+ deductibles to deter overuse.
7. Disrupt with Decentralized Care**
- Crypto-ERs: Blockchain-based emergency funds where contributors vote on covering members’ bills.
- AI-Guided Self-Care: Apps that stabilize patients en route to ERs (e.g., tourniquet tutorials, overdose reversal guidance).
8. Reform Malpractice to Reduce Defensive Medicine**
- “No Pay, No Harm” Liability: If a patient doesn’t pay, they can’t sue for malpractice (incentivizing upfront pricing).
- Safe Harbor Protocols: ERs using approved, cost-effective treatments (e.g., generics) get immunity from lawsuits.
The Uncomfortable Truth
A free market in emergency care requires accepting that not everyone will be saved—just as not everyone can afford a Ferrari. The alternative is the current U.S. model, which pretends to save everyone but bankrupts millions and still leaves 30% of ER visits unmet due to overcrowding.
By legalizing tiered care, deregulating monopolies, and forcing transparency, you create a system where:
- Elites pay premium prices for cutting-edge emergency care.
- Most get “good enough” stabilization at reasonable costs.
- Some choose cheap, high-risk options (or none at all).This isn’t pretty, but it’s honest—and arguably more ethical than today’s hidden rationing and financial toxicity.
-
@ 57d1a264:69f1fee1
2025-01-31 04:08:52Ready to be pushed beyond what you think you’re capable of?
At Coinbase, our mission is to increase economic freedom in the world. It’s a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform — and with it, the future global financial system.
To achieve our mission, we’re seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company’s hardest problems.
Our work culture is intense and isn’t for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there’s no better place to be.
Coinbase Developer Platform (CDP) is building the developer tools to bring the world onchain.
Today, onchain development is slow, risky, and painful, even for the most experienced onchain developers. Our goal is to bring a million developers onchain by creating an easy to use and trusted developer experience. We build API and SDK products for developers like wallets, paymaster, staking, stablecoins, onchain data, and more.
We are a small team that moves like a startup at Coinbase, with a fast pace, strong ownership culture, and a relentless commitment to making developers happy.
We are looking for a UX Researcher to help us build products and tools that support the developer experience. By researching the usability and ease of integration, the developer journey, user types, opportunities to improve documentation, and the developer's overall experience you will drive material product impact. You will also empower and enable the product team to conduct their own research through your expert consultation and facilitation.
What you’ll be doing
- Leading the UX Research function for our Developer Product Group, working in close partnership with the Design and Product teams - from large foundational and generative projects to evaluative, tactical, and investigative quick wins
- Coordinate and conduct mixed-methods research, including interviews, usability testing, concept testing, surveys, fieldwork, and other methods as needed
- Provide thoughtful guidance and education to stakeholders to turn vague business needs into actionable research questions
- Creatively think of new ways to enable the team to more easily gather their own feedback from developers.
- Craft research reports to clearly communicate your findings and make impactful design and product recommendations for the team.
What we look for in you
- 7+ years of user research experience, preferably with some experience in a lead role or primary point of contact for a large product area with many stakeholders
- Experience scaling UXR so that a variety of stakeholders can conduct effective and valuable research under your guidance
- Experience researching developer products and tools
- Working knowledge of general research principles (experimental design, bias, confounds, etc.) and UX research principles (usability testing, design thinking, etc.).
- Provides both confident team leadership and patient guidance to a range of stakeholder levels, including guiding designers and PMs through their own research
- Easily communicates complex concepts, with ability to influence strategy and decision making
- Can successfully manage project prioritization and multiple stakeholder relationships independently
- Experience with both moderated & unmoderated testing
- Collaborative attitude, team mentality, and humility
- A learner’s mindset, seeing feedback as a chance to grow
- Interest in crypto or financial products
Nice to haves
- Research experience working with AI
- Experience as a developer
- User of Coinbase products
Job ID: GDUXR06US
*Answers to crypto-related questions may be used to evaluate your onchain experience
Pay Transparency Notice: Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include target bonus + target equity + benefits (including medical, dental, vision and 401(k)).
Pay Range:
$193,970—$228,200 USD
Commitment to Equal Opportunity
Coinbase is committed to diversity in its workforce and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the Know Your Rights notice here. Additionally, Coinbase participates in the E-Verify program in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations[at]coinbase.com to let us know the nature of your request and your contact information. For quick access to screen reading technology compatible with this site click here to download a free compatible screen reader (free step by step tutorial can be found here).
Global Data Privacy Notice for Job Candidates and Applicants
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available here. By submitting your application, you are agreeing to our use and processing of your data as required. For US applicants only, by submitting your application you are agreeing to arbitration of disputes as outlined here.
originally posted at https://stacker.news/items/870703
-
@ f6488c62:c929299d
2025-01-31 03:32:46มาตรฐานการบัญชีใหม่ ASU 2023-08 ซึ่งประกาศใช้โดยคณะกรรมการมาตรฐานการบัญชีการเงิน (FASB) เมื่อวันที่ 13 ธันวาคม 2023 ได้สร้างความเปลี่ยนแปลงครั้งใหญ่ในวงการบัญชีสำหรับสินทรัพย์คริปโตเคอร์เรนซี โดยเฉพาะสำหรับบริษัทที่ถือครองสินทรัพย์ดิจิทัลจำนวนมาก เช่น MicroStrategy ซึ่งนำโดย Michael Saylor มาตรฐานนี้กำหนดให้บริษัทต้องวัดมูลค่าสินทรัพย์คริปโตตามราคาตลาด (fair value) และบันทึกการเปลี่ยนแปลงมูลค่าในรายได้สุทธิของแต่ละงวดการรายงาน ซึ่งส่งผลให้บริษัทต้องเผชิญกับความท้าทายใหม่ทั้งด้านการบัญชีและภาษี
มาตรฐาน ASU 2023-08: การเปลี่ยนแปลงสำคัญ มาตรฐาน ASU 2023-08 กำหนดให้บริษัทต้องวัดมูลค่าสินทรัพย์คริปโตตามราคาตลาด และบันทึกการเปลี่ยนแปลงมูลค่าในรายได้สุทธิของแต่ละงวดการรายงาน นอกจากนี้ ยังกำหนดให้บริษัทต้องเปิดเผยข้อมูลเพิ่มเติมเกี่ยวกับสินทรัพย์คริปโตที่ถือครอง เช่น ชื่อ มูลค่าต้นทุน มูลค่าตลาด และจำนวนหน่วยที่มีนัยสำคัญ การเปลี่ยนแปลงนี้ทำให้งบการเงินของบริษัทที่ถือครองสินทรัพย์คริปโตมีความโปร่งใสมากขึ้น แต่ก็เพิ่มความซับซ้อนในการดำเนินงานด้านบัญชีและการรายงาน
ผลกระทบต่อ MicroStrategy และ Michael Saylor MicroStrategy ซึ่งเป็นบริษัทที่ลงทุนใน Bitcoin อย่างมหาศาล กำลังเผชิญกับความท้าทายครั้งใหญ่จากมาตรฐานใหม่นี้ ภายใต้ ASU 2023-08 บริษัทจะต้องปรับปรุงวิธีการบัญชีและการรายงานสินทรัพย์คริปโต ซึ่งอาจส่งผลให้เกิดความผันผวนในงบการเงิน เนื่องจากมูลค่าของ Bitcoin และสินทรัพย์ดิจิทัลอื่นๆ มีความเปลี่ยนแปลงรวดเร็วและรุนแรง
Michael Saylor ผู้ร่วมก่อตั้งและประธานบริหารของ MicroStrategy เป็นหนึ่งในผู้สนับสนุนการลงทุนใน Bitcoin อย่างแข็งขัน เขาได้นำบริษัทเข้าสู่การถือครอง Bitcoin จำนวนมากตั้งแต่ปี 2020 ซึ่งทำให้บริษัทกลายเป็นหนึ่งในผู้ถือ Bitcoin รายใหญ่ที่สุดในโลก อย่างไรก็ตาม ภายใต้มาตรฐานใหม่นี้ Saylor และ MicroStrategy อาจต้องเผชิญกับภาระภาษีที่เพิ่มขึ้นอย่างมีนัยสำคัญ เนื่องจากการวัดมูลค่าตามราคาตลาดจะทำให้บริษัทต้องจ่ายภาษีจากกำไรที่เกิดขึ้นจากการเปลี่ยนแปลงมูลค่าของ Bitcoin
ภาระภาษีพันล้าน: ความท้าทายใหม่ของ Saylor การปรับมาตรฐานบัญชีตาม ASU 2023-08 อาจทำให้ MicroStrategy ต้องแบกรับภาระภาษีมหาศาล เนื่องจากบริษัทถือครอง Bitcoin จำนวนมาก และมูลค่าของ Bitcoin มีความผันผวนสูง การเปลี่ยนแปลงมูลค่าที่เกิดขึ้นในแต่ละงวดการรายงานจะถูกบันทึกเป็นรายได้หรือขาดทุน ซึ่งอาจส่งผลให้บริษัทต้องจ่ายภาษีจากกำไรที่เกิดขึ้น แม้ว่ากำไรดังกล่าวจะยังไม่ได้รับการรับรู้จริงจากการขายสินทรัพย์ก็ตาม
สำหรับ Michael Saylor นี่ไม่เพียงเป็นความท้าทายด้านการบัญชี แต่ยังเป็นความเสี่ยงทางธุรกิจที่อาจส่งผลต่อกลยุทธ์การลงทุนในอนาคต การปรับตัวให้เข้ากับมาตรฐานใหม่นี้จะต้องใช้ทรัพยากรและเวลาในการดำเนินงาน รวมถึงการวางแผนทางภาษีอย่างรอบคอบเพื่อลดผลกระทบทางด้านการเงิน
ความเหลื่อมล้ำทางภาษี: เมื่อรัฐบาลไม่ต้องจ่ายภาษี ที่น่าสนใจคือ หากรัฐบาลสหรัฐอเมริกาถือครอง Bitcoin รัฐบาลจะไม่ต้องจ่ายภาษีจากกำไรที่เกิดขึ้นจากการเปลี่ยนแปลงมูลค่า เนื่องจากรัฐบาลไม่ใช่หน่วยงานที่ต้องเสียภาษีเงินได้ นี่สร้างความเหลื่อมล้ำทางภาษีอย่างชัดเจนระหว่างภาครัฐและภาคเอกชน เช่น MicroStrategy ที่ต้องแบกรับภาระภาษีมหาศาลจากการถือครอง Bitcoin ในขณะที่รัฐบาลสามารถถือครองสินทรัพย์เดียวกันได้โดยไม่ต้องกังวลเรื่องภาษี
ตัวอย่างเช่น หากรัฐบาลสหรัฐฯ ถือครอง Bitcoin และมูลค่าของ Bitcoin เพิ่มขึ้นอย่างรวดเร็ว รัฐบาลจะได้รับประโยชน์จากกำไรที่เกิดขึ้นโดยไม่ต้องจ่ายภาษีใดๆ ในทางกลับกัน หากบริษัทเอกชนอย่าง MicroStrategy มีกำไรจาก Bitcoin จากการปรับมูลค่าตามมาตรฐาน ASU 2023-08 บริษัทจะต้องจ่ายภาษีจากกำไรนั้น แม้ว่าจะยังไม่ได้ขาย Bitcoin จริงก็ตาม
บทสรุป มาตรฐาน ASU 2023-08 เป็นการเปลี่ยนแปลงครั้งสำคัญที่ส่งผลกระทบต่อบริษัทที่ถือครองสินทรัพย์คริปโต โดยเฉพาะ MicroStrategy และ Michael Saylor การวัดมูลค่าตามราคาตลาดและการเปิดเผยข้อมูลเพิ่มเติมจะเพิ่มความโปร่งใส แต่ก็มาพร้อมกับภาระภาษีและความท้าทายด้านการบัญชีที่ไม่อาจมองข้าม สำหรับ Saylor นี่อาจเป็นจุดเปลี่ยนที่สำคัญในการบริหารจัดการสินทรัพย์ดิจิทัลของบริษัท และการตัดสินใจในอนาคตจะต้องคำนึงถึงผลกระทบจากมาตรฐานใหม่นี้อย่างรอบคอบ
ในขณะเดียวกัน ความเหลื่อมล้ำทางภาษีระหว่างภาครัฐและภาคเอกชนก็เป็นประเด็นที่ต้องจับตามอง การที่รัฐบาลไม่ต้องจ่ายภาษีจากการถือครอง Bitcoin ในขณะที่บริษัทเอกชนต้องแบกรับภาระภาษีมหาศาล ยิ่งตอกย้ำถึงความไม่เท่าเทียมกันในระบบการเก็บภาษี ซึ่งอาจเป็นประเด็นถกเถียงในวงกว้างในอนาคต
The Billion-Dollar Tax Burden Saylor Must Bear After Adopting ASU 2023-08 Accounting Standards: The Inequality of Government Tax Exemption
The new accounting standard, ASU 2023-08, announced by the Financial Accounting Standards Board (FASB) on December 13, 2023, has brought significant changes to the accounting treatment of cryptocurrency assets. This standard requires companies to measure crypto assets at fair value and record value changes in net income each reporting period. For companies holding large amounts of digital assets, such as MicroStrategy led by Michael Saylor, this change introduces new challenges in both accounting and taxation.
Key Changes in ASU 2023-08: ASU 2023-08 mandates that companies measure cryptocurrency assets at fair value and report value changes in net income. Additionally, companies must disclose more detailed information about their crypto holdings, such as the name, cost, market value, and significant quantities of crypto assets. While this increases financial transparency, it also adds complexity to accounting and reporting processes.
Impact on MicroStrategy and Michael Saylor: MicroStrategy, a company heavily invested in Bitcoin, faces significant challenges under this new standard. With ASU 2023-08, the company must adjust its accounting and reporting methods for crypto assets, which could lead to increased volatility in its financial statements due to the highly fluctuating nature of Bitcoin and other digital assets.
Michael Saylor, co-founder and CEO of MicroStrategy, has been a vocal advocate for Bitcoin investment. Since 2020, he has led the company to accumulate a substantial amount of Bitcoin, making MicroStrategy one of the largest corporate holders of Bitcoin globally. However, under the new standard, Saylor and MicroStrategy may face a substantial tax burden, as the company will be required to pay taxes on unrealized gains from Bitcoin's value fluctuations.
The Billion-Dollar Tax Burden: Adopting ASU 2023-08 could result in MicroStrategy bearing a massive tax liability. The company holds a significant amount of Bitcoin, and its value is highly volatile. Any changes in value during each reporting period will be recorded as income or loss, potentially requiring the company to pay taxes on gains even if the assets have not been sold.
For Michael Saylor, this is not just an accounting challenge but also a business risk that could impact future investment strategies. Adapting to the new standard will require significant resources and time, as well as careful tax planning to mitigate financial impacts.
Tax Inequality: When the Government Pays No Taxes: Interestingly, if the U.S. government were to hold Bitcoin, it would not be subject to taxes on gains from value fluctuations, as government entities are not required to pay income taxes. This creates a clear tax inequality between the public and private sectors. While companies like MicroStrategy face hefty tax burdens from holding Bitcoin, the government could hold the same assets tax-free.
For example, if the U.S. government held Bitcoin and its value surged, the government would benefit from the gains without paying any taxes. In contrast, private companies like MicroStrategy would have to pay taxes on unrealized gains, even if they haven't sold the Bitcoin.
Conclusion: ASU 2023-08 represents a significant shift for companies holding cryptocurrency assets, particularly MicroStrategy and Michael Saylor. While the standard enhances transparency, it also introduces substantial tax and accounting challenges. For Saylor, this could be a pivotal moment in managing the company's digital assets, requiring careful consideration of the new standard's implications.
At the same time, the tax inequality between government and private entities is a noteworthy issue. The fact that the government can hold Bitcoin tax-free while private companies face massive tax burdens highlights an inequity in the tax system, which may spark broader debates in the future.
-
@ 57d1a264:69f1fee1
2025-01-31 02:07:27Bitcoin Design members have been involved in organizing various events (and sometimes just attend, too). Here below is what do we want to do in 2025:
-
Designathon 2 - We are organizing this event between February or March.
-
Accessibility Day - May 15
-
- BDC has participated in this global initiative the last two years. Probably doing so again!
-
BTC Prague -Participation Confirmed. Planning issues here - June 19 - 21
-
- 2024 was great, in that we had a nice group of designers attend, do talks, go for dinner, etc.
-
- Several designers and projects participated each of the last 3 years. Probably doing so again!
-
- Applications open on Feb 1, main program is May to August (timeline
-
UX Bootcamps
-
- Previous: South America
-
- Next: South America - February 17 - 22
-
- First iteration of this fellowship is from January to July
-
- We will help find more designers, projects, and funding in India
-
Oslo Freedom Forum - Oslo, May 26-28
-
- Activist and financial repression use cases are uniquely important use cases for bitcoin.
-
- Several people attended last year. Conversations lead to new initiatives.
-
BTCHEL - by BTC Helsinki Community - Aug 15-16
-
- First large-scale bitcoin conference in the Nordics with particular focus to onboard new users to bitcoin
-
Bitcoin Presidio design week
-
- This is a new Bitcoin co-working space in San Francisco, also announced here https://stacker.news/items/860931/r/Design_r. The idea came up to organize a design week there to support the creation of art and decoration for the new co-working space. Just an idea at the moment, but why not make it happen?
-
BuildWithLDK
-
- An initiative to promote LDK and LDK Node for building lightning applications. There could be collaboration around a Designathon, connecting designers with hackathon projects, etc. Still in early planning.
-
Builder conferences: These are very builder-focused, making them good opportunities to connect, organize practical design workshops, creative presentations, and support projects from a design perspective
-
- Baltic Honeybadger (August 9-10),
-
- Bitcoin++ There are going to be 6 of them throughout the year.
-
- SATS’N’FACTS (February 8-10) Bitcoin Technical Unconference, Hackathon & Freedom Tech Art Exhibition
-
*Open-source conferences & events
-
- FOSS Backstage (Berlin, Mar 10-11) - Christoph will present the Open Design Guide
-
- FOSDEM (Brussels, Feb 1-2) - anyone attending?
-
Design conferences & events - Makes sense to be involved with design-only events, right?
- OFFF - very creative-focused (Barcelona, May 8-10)
- CSUN Accessibility conference
Other Ideas * Bitcoin Park - they might organize another design event like two years ago https://stacker.news/items/705081/r/Design_r
Links * Comprehensive list of bitcoin conferences
… what’s missing from this page? Are you involved with anything? Or want to be? Comment below or join us on https://discord.com/channels/903125802726596648/1087394066796384276
You can watch the recording from https://www.youtube.com/watch?v=GGS3oSlLmAo
originally posted at https://stacker.news/items/870638
-
-
@ 5d4b6c8d:8a1c1ee3
2025-01-31 02:01:24The Raiders just re-signed DC Patrick Graham. This is a huge relief. Graham is an excellent DC and there was a very high likelihood of him leaving for another team.
Retaining Graham also provides some much needed continuity and sheds a lot of light on what direction they're likely to go. There are a ton of free agents from last year's defense and I think the best players will likely be back.
With that in mind, let's get a look at how the Raiders 2025 roster is looking as we enter the offseason.
Position Groups
I'm going to sort guys by "elite", "good starter", "average", "solid backup" and just hope anyone worse than a solid backup is cut or waived.
QB
1 Solid Backup
AOC is our only real QB and he should be the backup. They need to draft a high upside QB and possibly take a flyer on a vet who they can buy low on.
RB
3 Solid Backups
None of these guys are who you want to build around, but they're all better than the guy who got most of the RB snaps this season: McCormack and Mattison might even be average.
They need to draft or sign a good or elite RB.
WR
1 Good, 1 Average, 1 Solid Backup
The best receiver on this team is in the next group. Adding another average, or better, receiver would be nice, but it's not a priority. They just need depth and scheme fit.
TE
1 Elite, 1 Good Starter
This is the best TE duo in the league. Mayer would be TE1 on most squads and Bowers is the best in the league. They just have to identify a couple of depth guys for special teams and 13 personnel sets.
O-Line
1 Elite, 3 Average, 2 Solid Backup
Calling JPJ "elite" might be jumping the gun, but he was fantastic in the few games that he actually got to play center. Kolton Miller might be good, but he was trash this past season, so I'm calling him average for now. Either way, they should be looking for an elite tackle and better guards.
D-Line
2 Elite, 2 Good Starter, 2 Average, 2 Solid Backups
This line should be the strength of the team and one of the better lines in the league. Despite injuries to three of the four best players, they still played really well last season.
They really don't need to add to this group, but I've been mocking Mason Graham to them, which would mean an absolutely dominant group.
LB
1 Good Starter
Robert Spillane has been better than anyone imagined, but they need to find him better help. Hopefully, that's a combination of high upside rookies and cheap solid veteran FA's.
Patrick Graham mostly uses a nickel defense and even uses dime packages, so there's not a ton of value in loading up on more high-level LB's.
Safety
2 Good Starters, 1 Average
All three of these guys are free agents and they may not re-sign Epps. They mostly just need depth guys.
CB
1 Good Starter, 2 Average, 1 Solid Backup
I had a hard time rating all three of the starters. One of them is probably good, but I'm not sure which one. The bottom line is that this group is fine, but the team needs more high-end talent.
ST
2 Elite
Carlson and Cole are the best special teams duo in the league.
There's room to upgrade pretty much every position, which makes the draft a bit easier. As long as they don't draft anymore TE1's, they can just go BPA.
In free agency, I think the focus should be on the O-line and RB room. If there's an upgrade at QB available, obviously jump on it, but they shouldn't break the bank going after the guys we know are available.
originally posted at https://stacker.news/items/870633
-
@ 3ccfd5ee:2efa0073
2025-01-31 17:24:28BYD Cars Philippines and ACMobility, the Philippine distributor of BYD vehicles, have pledged to donate $100 to Super Typhoon Carina's victims for every BYD Sealion 6 DM-i sold from July 25, 2024 until December 31, 2024.
This campaign is part of both companies' broader efforts to the affected communities and reflects their dedication to social responsibility. In fact, ACMobility was one of the first to mobilize disaster response efforts by distributing relief goods to over 100 families in Dela Paz, Pasig City, on July 26. Employees and volunteers from ACMobility, BYD Cars Philippines, and its affiliate agencies participated in the cause.
“On behalf of BYD, I would like to express my sympathy to the people affected by Typhoon Carina. We, together with ACMobility, wish to extend BYD's support to Filipinos who suffered from this unfortunate disaster,” said BYD Asia Pacific Auto Sales Division General Manager Liu Xueliang.
The BYD Sealion 6 DM-i is an all-electric compact SUV that runs on BYD's proprietary Super DM-i Technology—generating power well beyond the typical electric vehicle. It generates 217 horsepower and 325 Newton meters of torque, enabling it to go from zero to a hundred in just over eight seconds.
Furthermore, the vehicle runs on Blade Battery, allowing it to drive up to 105 kilometers in Pure EV Mode and 1,100 km in Extended Range Mode. It empowers drivers to travel without range anxiety. Attendees of ACMobility and BYD Cars Philippines' relief drive even used the Sealion 6 DM-i's Blade Battery to charge devices on-site. The Sealion 6 DM-i starts at ₱1,548,000. With every unit sold, BYD and ACMotors donate $100 to Typhoon Carina's victims until the end of 2024.
"Guided by our company value of malasakit, we remain committed to going above and beyond in serving our communities during these trying times," BYD Cars Philippines Managing Director Bob Palanca shared.
Super Typhoon Carina—internationally known as Gaemi—brought widespread devastation across the Philippines. The National Disaster Risk Reduction and Management Council (NDRRMC) stated that Carina, on top of the southwest monsoon, affected over 1.3 million Filipinos.
About BYD Cars Philippines
BYD Cars Philippines is a leader in the Filipino EV industry. As the Philippine arm of the globally renowned electric car and battery manufacturer, it brings cutting-edge technology and powerful yet comfortable drives to the local sustainable mobility market. The EV manufacturer has a range of models designed to address the needs of Filipinos, from affordable cars to luxury SUVs. Each vehicle's cutting-edge tech and superior safety features make every purchase worth it. Most importantly, BYD addresses the growing demand for eco-friendly cars and actively participates in initiatives to build greener mobility infrastructure for Filipinos.
Visit BYD Cars Philippines' website today to learn more.
-
@ bf6e4fe1:46d21f26
2025-01-31 01:51:03{"title":"test","content":"test"}
-
@ 3ccfd5ee:2efa0073
2025-01-31 17:05:59Penis size is a topic that many people feel curious or insecure about. It’s important to approach this subject with an understanding of the wide range of normal sizes and the various options available for those who may be interested in enlargement procedures. For some, the use of sex toys or dildos may be a practical solution to enhance sexual experiences, while others may look into enlargement procedures. Here’s a brief overview of what you should know about average penis size and the options available for enlargement.
What is the Average Penis Size?
Studies consistently show that the average erect penis size is around 5 to 6 inches in length, and the average flaccid size is about 3 to 4 inches. It’s crucial to recognize that penis size varies among individuals, and there is a broad spectrum of what is considered normal. Factors like body type, genetics, and age can all influence size. Most men’s sizes fall within this range, and concerns about size often arise from misconceptions rather than actual medical issues.
Penis Enlargment as an Alternative
For those interested in penis enlargement, there are a few options available. These include surgical procedures, non-surgical devices, and sometimes even the use of sex toys to create a fuller feeling or enhance size temporarily. Here’s a closer look at the most common methods:
Surgical Procedures
One of the most well-known surgical options is penile lengthening surgery, where a surgeon cuts the suspensory ligament that supports the penis, allowing it to hang lower. While the procedure can result in a modest increase in length, it carries risks such as infection, scarring, and potential issues with erectile function. Always consult with a qualified healthcare provider before considering surgery.
Non-Surgical Options
Devices like penis pumps or penile traction devices are often used to temporarily increase size. A penis pump creates a vacuum that draws blood into the penis, temporarily making it appear larger. Traction devices apply gentle pressure to the penis over time, which can result in gradual lengthening. Both of these methods can offer temporary improvements, but they require consistent use and do not guarantee long-lasting results.
Sex Toys and Dildos
For those looking for a more immediate solution, dildos and other sex toys can offer a way to enhance sexual pleasure without altering physical size. These toys come in a wide range of shapes, sizes, and materials, allowing individuals and couples to explore different sensations. Find a dildo for sale that can provide added size during intercourse, and using sex toys can also help individuals become more comfortable with their bodies, leading to better self-esteem and sexual confidence.
Penis Enlargement Pills or Supplements
Many products on the market claim to increase penis size, but the effectiveness of these pills is largely unproven. Medical experts often caution against using such supplements, as they can have unwanted side effects and are not regulated.
-
@ 3ccfd5ee:2efa0073
2025-01-31 16:50:06To stay competitive, many companies are outsourcing key administrative and management functions in manufacturing. This approach helps businesses better manage deliverables, reduce costs, utilize advanced technology, and navigate changing labor dynamics.
What is Outsource Manufacturing?
Outsourcing manufacturing involves delegating not only production but also important administrative and management tasks to external providers, rather than handling everything in-house. These tasks often include non-core activities such as supply chain management, procurement, quality assurance, and compliance.
By partnering with specialized manufacturers, often in regions with lower labor and operational costs, companies can take advantage of their expertise and efficiency. The process typically begins with selecting a trusted manufacturer, negotiating contracts, and overseeing production to ensure quality and timely delivery.
5 Types of Outsource Manufacturing Services
Outsourcing specific tasks can streamline your operations and reduce costs. Here’s an overview of the key outsourcing services for manufacturing:
Contract Management
Managing contracts with manufacturers and suppliers can be complex and time-consuming. By outsourcing this function, you allow experts to handle negotiations, oversee agreements, and ensure smooth operations, reducing legal risks and freeing you to focus on other vital business areas.
Supplier Management
Supplier management includes finding and vetting suppliers based on quality, pricing, and reliability. By building a dedicated team through optiBPO in the Philippines, you can streamline this process. The team will handle negotiations and ensure that suppliers meet your standards, giving you full control without the administrative burden.
Logistics Coordination
From transportation to warehousing, logistics coordination involves many moving parts. Outsourcing this function to a skilled team, like one from optiBPO, allows you to optimize the logistics process, choosing the best transportation methods and balancing cost, speed, and reliability. This ensures efficient and timely product deliveries.
Quality Assurance Coordination
Consistently maintaining high product quality is essential for customer satisfaction and brand reputation. Outsourcing quality assurance lets a team of professionals handle inspections, compliance checks, and data analysis to reduce defects, enhance product reliability, and maintain high standards.
Inventory Management
Managing inventory levels, ordering, and stock maintenance can be overwhelming. By outsourcing these administrative tasks, your external team can monitor inventory, forecast demand, and coordinate with suppliers to ensure stock is always replenished on time. Services from optiBPO can streamline this process and keep operations running smoothly.
In Conclusion
By outsourcing these crucial functions, your business can gain access to expertise, improve efficiency, and reduce costs—ultimately allowing you to focus on what matters most: growing your business.
You can learn more about ousource manufacturing through this infographic.
https://sp-ao.shortpixel.ai/client/to_webp,q_glossy,ret_img,w_800/https://optibpo.com/wp-content/uploads/2024/10/outsource_manufacturing_Info8.png
-
@ f6488c62:c929299d
2025-01-31 01:27:07Crypto News Summary for January 31, 2025
-
Bitcoin Price MovementsThe latest Bitcoin (BTC) price stands at $104,754, marking an increase of $542 or approximately 0.52% from the previous day. The highest price during the day was $106,351, while the lowest was $104,054.
-
Major Crypto News
Grayscale Files for XRP ETF on NYSE: Grayscale has submitted Form 19b-4 to launch an exchange-traded fund (ETF) for XRP on the New York Stock Exchange (NYSE), marking a significant move in the cryptocurrency sector.
Terra Luna Community Votes to Burn LUNA, Price Surges 73%: The Terra Luna community has voted in favor of burning LUNA tokens, leading to a 73% price surge within a single day.
Bitkub Chain to Test Thai Baht Digital: Bitkub Chain is preparing to test the Thai Baht Digital currency, which has resulted in the KUB token price surging by over 30%.
-
Market AnalysisAnalysts advise closely monitoring the crypto market due to ongoing volatility. While Bitcoin remains strong, many altcoins continue to show weakness.
-
Other Notable News
Metaplanet Plans Additional Bitcoin Purchases: Metaplanet aims to invest over 25.2 billion baht in Bitcoin, targeting a total holding of 21,000 BTC by 2026.
JPMorgan Highlights Correlation Between Tech Stocks and Crypto: JPMorgan has identified a link between the movements of small-cap tech stocks and cryptocurrencies, which may serve as an indicator for future market trends.
สรุปข่าวคริปโตประจำวันที่ 31 มกราคม 2025
-
ความเคลื่อนไหวของราคา Bitcoinราคาบิตคอยน์ (BTC) ล่าสุดอยู่ที่ 104,754 ดอลลาร์สหรัฐ เพิ่มขึ้น 542 ดอลลาร์สหรัฐ หรือประมาณ 0.52% จากวันก่อนหน้า โดยมีราคาสูงสุดระหว่างวันที่ 106,351 ดอลลาร์สหรัฐ และต่ำสุดที่ 104,054 ดอลลาร์สหรัฐ
-
ข่าวเด่นในวงการคริปโต
Grayscale ยื่นเปิดตัว XRP ETF ผ่าน NYSE: บริษัท Grayscale ได้ยื่นฟอร์ม 19b-4 เพื่อเปิดตัวกองทุนซื้อขายแลกเปลี่ยน (ETF) สำหรับ XRP ผ่านตลาดหลักทรัพย์นิวยอร์ก (NYSE) ซึ่งเป็นความเคลื่อนไหวที่สำคัญในวงการคริปโตเคอเรนซี
ชุมชน Terra Luna โหวตเผาเหรียญ LUNA ดันราคาพุ่ง 73%: ชุมชน Terra Luna ได้ลงคะแนนเสียงสนับสนุนการเผาเหรียญ LUNA ส่งผลให้ราคาของเหรียญเพิ่มขึ้นถึง 73% ในวันเดียว
Bitkub Chain เตรียมเปิดทดสอบ Thai Baht Digital: Bitkub Chain กำลังเตรียมเปิดการทดสอบสกุลเงินดิจิทัลไทยบาท (Thai Baht Digital) ซึ่งส่งผลให้ราคาเหรียญ KUB เพิ่มขึ้นกว่า 30%
-
การวิเคราะห์ตลาดนักวิเคราะห์แนะนำให้จับตาตลาดคริปโตอย่างใกล้ชิด เนื่องจากยังคงมีความผันผวน แม้ว่าบิตคอยน์จะแสดงความแข็งแกร่ง แต่เหรียญทางเลือก (Altcoin) หลายเหรียญยังคงอ่อนแรง
-
ข่าวอื่นๆ ที่น่าสนใจ
Metaplanet เตรียมซื้อ Bitcoin เพิ่ม: บริษัท Metaplanet วางแผนลงทุนกว่า 25,200 ล้านบาท เพื่อซื้อบิตคอยน์ โดยตั้งเป้าถือครอง 21,000 BTC ภายในปี 2026
JPMorgan ชี้ความสัมพันธ์ระหว่างหุ้นเทคโนโลยีและคริปโต: JPMorgan ระบุถึงความสัมพันธ์ระหว่างการเคลื่อนไหวของหุ้นเทคโนโลยีขนาดเล็กและสกุลเงินดิจิทัล ซึ่งอาจเป็นสัญญาณบ่งชี้ถึงแนวโน้มตลาดในอนาคต
-
-
@ 8d34bd24:414be32b
2025-01-30 23:35:39Sometimes I’m reading the Bible and see a connection and go off chasing a rabbit trail. I type up my idea to organize my thoughts and see if there is actual Biblical support for it. Although it feels a bit weird to share Biblical ideas that I’m not certain about, it also seems a waste of lots of work to not share my speculations. Feel free to give me feedback if you disagree, especially if you have Scripture or historical evidence showing I’m wrong.
In this case, I’ve seen a portion that seems to be prophecy about our future, but that doesn’t necessarily mean that this entire group of chapters is future predictions. Sometimes prophecy mixes events that happens soon after the prophecy with events that will not be fulfilled until the distant future (like prophecies about Jesus’s first and second comings). I try to be open about what ideas I feel I have strong Biblical evidence to support and when my ideas have some evidence, but not conclusive evidence. This is one of my more speculative posts, but I hope you will find it thought provoking.
I was recently reading Isaiah 18-22. I had always assumed these prophecies of warning were in reference to things that had happened in the distant past (not that I knew any particular historical fulfillment), but this time I saw some major parallels with Revelation.
Now behold, here comes a troop of riders, horsemen in pairs.” And one said, “Fallen, fallen is Babylon; And all the images of her gods are shattered on the ground.” (Isaiah 21:9) {emphasis mine}
From Revelation:
And another angel, a second one, followed, saying, “Fallen, fallen is Babylon the great, she who has made all the nations drink of the wine of the passion of her immorality.” (Revelation 14:8) {emphasis mine}
And he cried out with a mighty voice, saying, “Fallen, fallen is Babylon the great! She has become a dwelling place of demons and a prison of every unclean spirit, and a prison of every unclean and hateful bird. (Revelation 18:2) {emphasis mine}
Of course it is possible that Babylon and Babylon the great are parallel, but different nations, but the similarity of statement is hard to deny.
All you inhabitants of the world and dwellers on earth,\ As soon as a standard is raised on the mountains, you will see it,\ And as soon as the trumpet is blown, you will hear it. (Isaiah 18:3) {emphasis mine}
This passage talks about all inhabitants of the world seeing a standard raised. Until the past 20 years or so, this was not possible. Now that almost every person on earth has a smart phone, we can know what is going on around the world in real time. This passage also refers to “dwellers on earth” which is a phrase used numerous times in Revelation.
In Revelation 11, it speaks of the two witnesses who testify to Jesus and call down plagues on the earth. After their death:
And their dead bodies will lie in the street of the great city which mystically is called Sodom and Egypt, where also their Lord was crucified. Those from the peoples and tribes and tongues and nations will look at their dead bodies for three and a half days, and will not permit their dead bodies to be laid in a tomb. And those who dwell on the earth will rejoice over them and celebrate; and they will send gifts to one another, because these two prophets tormented those who dwell on the earth. (Revelation 11:8-10) {emphasis mine}
Both passages refer to those who dwell on the earth and both talk about every person on earth seeing what is happening. This doesn’t sound like a prophecy fulfilled in ancient times, but about a prophecy that could not be fulfilled until modern times.
If these prophecies are about the end times and if the end times are now or very soon, what could they be referring to? Isaiah 18 begins with:
Woe to the land of whirring wings\ along the rivers of Cush,\ which sends envoys by sea\ in papyrus boats over the water.\ Go, swift messengers,\ to a people tall and smooth-skinned,\ to a people feared far and wide,\ an aggressive nation of strange speech,\ whose land is divided by rivers. (Isaiah 18:1-2)
Cush was located where modern day Sudan is located on the western edge of the Red Sea. Right across the red sea is Yemen which has been involved in missile and drone strikes on ships in the Red Sea. Traditionally the “land of whirring wings” is interpreted to mean locusts, but could it be referring to modern technology like drones? Who is Cush sent to seek? Who are the people “over the water,” “tall1 and smooth-skinned,” “feared far and wide,” and “an aggressive nation of strange speech,\ whose land is divided by rivers.”? I wonder if it could be the US. The US is over the Atlantic Ocean, “feared far and wide,” “an aggressive nation of strange speech” (involved in the business of almost every nation on earth), and divided by the Mississippi River (and to a lesser extent the Missouri and Ohio Rivers). The US also likes to act as the world’s policeman and get involved in every international dispute in the world. If Sudan was in fear of attack by the Houthis in Yemen, it would be expected for the US to be called in and get involved.
At the end of this prophecy:
At that time gifts will be brought to the Lord Almighty\ from a people tall and smooth-skinned,\ from a people feared far and wide,\ an aggressive nation of strange speech,\ whose land is divided by rivers—\ the gifts will be brought to Mount Zion, the place of the Name of the Lord Almighty. (Isaiah 18:7)
This same nation will bring a gift to Mount Zion (Jerusalem/Israel). The US has been regularly giving Israel weapons to defend itself from attacks by the enemies around it. If this nation is the US, then this would make sense, especially with our change in leadership.
When I read Isaiah 19, it made me think of the Muslim Brotherhood takeover of Egypt starting in 2011.
“I will stir up Egyptian against Egyptian—\ brother will fight against brother,\ neighbor against neighbor,\ city against city,\ kingdom against kingdom.\ The Egyptians will lose heart,\ and I will bring their plans to nothing;\ they will consult the idols and the spirits of the dead,\ the mediums and the spiritists.\ I will hand the Egyptians over\ to the power of a cruel master,\ and a fierce king will rule over them,”\ declares the Lord, the Lord Almighty. (Isaiah 19:2-4)
The next part of this passage talks about the Nile drying up and the canals stinking and the fields becoming parched. I did a web search related to drought in Egypt and found an article about drought fears from 2020. The building of the Grand Ethiopia Renaissance Dam on the Blue Nile is causing a fear of major drought in Egypt. There are negotiations between Egypt, Sudan, and Ethiopia to deal with this, but it looks like an ongoing issue for Egypt. An interesting fact is that Ethiopia started building this dam in 2011 -- the same year of the Muslim Brother Hood overthrow of Egypt.
The biggest problem with my theory is Isaiah 20, which talks about Assyria leading Egypt and Cush (Sudan) away as captives. Assyria was located in what is currently Northern Iraq. It is hard to fathom Iraq conquering Egypt and Sudan. The area of Assyria did include a little bit of Turkey, which would be more believable as a conqueror.
Now we get back to the verses in Isaiah 21, which started this musing. First there is a description of terrorists attack:
A prophecy against the Desert by the Sea:
Like whirlwinds sweeping through the southland,\ an invader comes from the desert,\ from a land of terror.\ A dire vision has been shown to me:\ The traitor betrays, the looter takes loot.\ Elam, attack! Media, lay siege!\ I will bring to an end all the groaning she caused. (Isaiah 21:1-2)
Elam is the Eastern edge of Iraq on the Border of Iran and Media is in Iran. Could this be an attack from Iran that includes some of its Shia allies in Iraq? What kind of attack could it be – conventional or nuclear? Who are they attacking?
Look, here comes a man in a chariot\ with a team of horses.\ And he gives back the answer:\ ‘Babylon has fallen, has fallen.\ All the images of its gods\ lie shattered on the ground!’ ”\ My people who are crushed on the threshing floor,\ I tell you what I have heard\ from the Lord Almighty,\ from the God of Israel. (Isaiah 21:9-10)
In ancient times, Babylon was located in the location of modern Iraq, but if we look at the words “Babylon has fallen, has fallen,” and associate them with the almost identical words in Revelation, “Fallen, fallen is Babylon the great,” and we consider how Revelation also refers to “Mystery Babylon” then we are likely talking about an attack on a different nation. (Why would Babylon be a mystery if it was the same people in the same location? It would be a mystery if it was a country and peoples that didn’t exist at the time of the prophecy, but would have the spirit of Babylon in them.) If you take into account my arguments in “Speculation on Babylon the Great” and associate this nation with the people “over the water,” “tall and smooth-skinned,” “feared far and wide,” and “an aggressive nation of strange speech, whose land is divided by rivers.” then this could be an attack on the US (I’ll admit there is a fair amount of speculation here). Although the US has become quite anti-God and has been pushing a lot of evil around the world, it still has one of the largest populations of believers in the world. The statement “My people who are crushed on the threshing floor” also fits for the US.
I know some people won’t consider the possibility that the US could be Mystery Babylon or Babylon the Great because they can’t consider the US being an evil nation, but the US has been pushing many unbiblical ideas on the nations around the globe, like LGBTQ ideology and abortion. It is also possible I am looking too hard for my own country in the scriptures because if the US isn’t mentioned, then something has to happen to the US before the Tribulation occurs to make the US become unimportant in international affairs. We all have our biases.
I’d love to hear your thoughts on my speculations. I’d also like to hear whether people benefit from my speculations or prefer me to stick to the clear and more easily understood Bible passages and Bible truths.
Trust Jesus.\ \ your sister in Christ,
-
@ 16d11430:61640947
2025-01-30 22:11:40The Beginnings of Capital Markets
Capital markets have long been a cornerstone of modern economies, acting as a conduit for businesses to raise funds and for investors to grow their wealth. The origins of capital markets date back to the early stages of financial development, well before modern stock exchanges and cryptocurrency trading platforms.
-
Early Trading (Pre-1600s)
In ancient civilizations like Mesopotamia and Egypt, early forms of debt contracts and loans were recorded. These were rudimentary agreements between individuals and governments, often written on clay tablets. However, it wasn’t until the 16th century that true capital markets began to take shape, particularly in Europe. -
The Birth of Stock Markets (1600s)
The first formal stock exchange was established in Amsterdam in 1602 when the Dutch East India Company issued the first-ever public shares. This allowed investors to buy ownership in the company and share in its profits, creating the foundation for modern capital markets. The London Stock Exchange (LSE) and New York Stock Exchange (NYSE) would follow in the centuries to come, becoming powerful centers for trade and investment.
The Rise of Centralized Exchanges (CEX)
Capital markets, particularly in the form of centralized exchanges (CEX), flourished during the industrial revolution. As economies grew and industries expanded, capital markets evolved to meet the needs of investors and companies seeking to raise capital.
-
The Industrial Revolution (1800s)
The industrial era saw the rise of joint-stock companies and the need for capital. Stock exchanges were the main platforms through which companies could access capital and investors could trade securities. The London Stock Exchange became a dominant force in Europe, while the NYSE emerged as the largest exchange in the U.S. -
The 20th Century: Globalization and Regulation
In the 20th century, capital markets became more complex and globalized. The NYSE became synonymous with the U.S. stock market, and financial markets spread across the world, with exchanges in Asia and Europe gaining prominence. The rise of mutual funds, pension funds, and institutional investors reshaped the landscape.
The post-World War II era brought regulations like the Securities Exchange Act of 1934 in the U.S., which aimed to curb insider trading, increase transparency, and protect investors. Exchanges became highly regulated entities, with central authority overseeing transactions, clearing, and settlement to ensure fairness and stability.
- The Digital Revolution and Electronic Trading (Late 20th Century)
By the 1980s and 1990s, the introduction of electronic trading platforms marked a turning point. The NYSE and NASDAQ implemented computerized systems that facilitated faster and more efficient trades. In 1999, the launch of online trading platforms like E*Trade and Ameritrade democratized access to capital markets, allowing individuals to trade stocks from the comfort of their homes.
The Advent of Cryptocurrencies and the Emergence of CEX
As the new millennium dawned, the rise of digital technology and the internet introduced an entirely new form of asset: cryptocurrency. Bitcoin, created in 2009 by the pseudonymous Satoshi Nakamoto, introduced the world to decentralized digital currency. Cryptocurrencies offered an alternative to traditional fiat currencies and paved the way for decentralized finance (DeFi).
- The Birth of Cryptocurrency Exchanges (CEX)
The initial stages of cryptocurrency trading mirrored the early days of stock exchanges. As Bitcoin gained traction, platforms like Mt. Gox (2010) emerged as centralized cryptocurrency exchanges (CEX). These platforms allowed individuals to buy and sell Bitcoin and other cryptocurrencies, just like traditional stock exchanges facilitated the trading of stocks and bonds.
CEXs operate in a centralized manner, much like traditional financial exchanges, with a central authority acting as an intermediary between buyers and sellers. They provide liquidity, manage orders, and offer users a platform for trading various cryptocurrencies. Binance, Coinbase, and Kraken are examples of some of the largest CEXs today.
- The Role of CEXs in Crypto Adoption
Centralized exchanges have played a crucial role in cryptocurrency adoption. They provide easy access to the crypto markets, ensuring liquidity and stability. Many investors, both retail and institutional, enter the crypto world through CEXs due to their ease of use, familiarity, and regulatory oversight.
The Rise of Decentralized Exchanges (DEX)
While CEXs have dominated the landscape, the growing desire for decentralization in the cryptocurrency space gave rise to decentralized exchanges (DEXs). The idea behind DEXs is to create an exchange system that operates without a central authority, relying instead on smart contracts and blockchain technology to facilitate peer-to-peer trading.
- The Emergence of DEXs (2010s)
In 2014, the first DEX, EtherDelta, was launched on the Ethereum blockchain. It allowed users to trade ERC-20 tokens directly from their wallets, without the need for a centralized intermediary. While EtherDelta’s interface was rudimentary, it set the stage for a new wave of decentralized trading platforms.
The DEX market gained significant momentum with the rise of Uniswap (launched in 2018), which revolutionized decentralized trading by using an automated market maker (AMM) model instead of an order book system. This innovation allowed anyone to provide liquidity to the platform and earn fees, paving the way for the growth of decentralized finance (DeFi).
- Advantages of DEXs
DEXs offer several advantages over their centralized counterparts: - Decentralization: There is no central authority that controls user funds or the exchange itself. This makes DEXs more resistant to censorship and hacking.
- Privacy and Security: Users retain control of their private keys and funds, reducing the risk of exchange hacks that have plagued centralized platforms.
-
Global Access: DEXs are open to anyone with an internet connection and a wallet, allowing users worldwide to participate in trading and liquidity provision.
-
The Growth of DeFi and DEXs
As decentralized finance (DeFi) platforms grew in popularity, DEXs became the primary infrastructure for decentralized lending, borrowing, and trading. Uniswap, SushiSwap, and PancakeSwap emerged as dominant players in the DeFi space, offering decentralized token swaps, liquidity pools, and yield farming.
The rise of Layer 2 solutions, such as Optimism and Arbitrum, has further enhanced the scalability of DEXs, reducing transaction costs and increasing throughput, making decentralized exchanges more user-friendly and competitive with CEXs.
The Future of Capital Markets: CEX vs. DEX
The evolution of capital markets from traditional stock exchanges to cryptocurrency exchanges, and now to decentralized platforms, reflects the growing demand for more accessible, transparent, and efficient ways of conducting financial transactions.
While centralized exchanges still dominate the crypto space, providing crucial liquidity and stability, decentralized exchanges are growing rapidly, offering unique advantages in terms of decentralization, privacy, and global accessibility.
In the coming years, capital markets may continue to evolve, with hybrid models emerging that combine the best aspects of both CEXs and DEXs. The ability to trade traditional assets on blockchain platforms, the rise of tokenized stocks and securities, and the integration of decentralized finance could reshape the entire financial landscape, empowering individuals and institutions alike.
The transition from traditional centralized systems to decentralized ones is part of a larger trend towards democratization in finance. As technology continues to advance, capital markets will likely undergo further transformations, and we may soon witness the integration of these markets in ways that were once unimaginable, making financial systems more inclusive, transparent, and resilient.
-
-
@ 1408bad0:4971f2ca
2025-01-30 21:53:58I must have missed when season 2 of Silo dropped but I was very happy when I did. After the climax of season 1, we were waiting to see what happened in season 2.
I was expecting the surface to be breathable, so it was a surprise twist when it wasn't. You would think the earth would be breathable again and heal, but not yet so far.
The second series sees what happens in a neighbouring Silo and how the old Silo reacts without Juliette and her not cleaning as everyone does when they go out usually. Juliette then tries to get home and faces various challenges in order to do so.
As she does so, we also see the detioration of her own Silo. We learn more answers to questions about the Silo, it's history and how people lost their memories and why they got rid of old artefacts that remind them of the old world. It gives you a sense of not appreciating the world and life we currently have.
Some of the answers seem quite silly and you wonder if this is really necessary. Why don't they feel the need to test the air outside regularly etc, why be so cut off. More questions come than are answered.
However, the show is still very good and enjoyable. I binge watched over night until it finished.
My favourite scene, apart from the part when Juliette went back to the surface, is learning about the special room and how prepared it was. It would be good to have a bunker so we'll prepared.
Apocalyptic ending shows are quite popular now and this is quite an interesting variation of one. The series ends with flashbacks to the start of events prior to the silos and looks like it is leading up to a great season 3 flashback series. This sort of makes sense as they seem to be running out of ideas of where to go in the silo.
We were left with a cliffhanger ending and I am excited to see season 3 but there will be a bit of a wait.
-
@ 16d11430:61640947
2025-01-30 21:32:58Bitcoin was forged in the crucible of libertarian ideals—freedom, decentralization, and voluntary cooperation. It was meant to be an open, permissionless system that empowers individuals by circumventing the coercive grip of centralized institutions. Yet, as Bitcoin maximalism has matured, it has developed an increasingly exclusive and dogmatic culture, paradoxically betraying the very principles it was built upon.
The Libertarian Ethos of Bitcoin
At its core, Bitcoin aligns with libertarianism in the following ways: - Decentralization: No central authority dictates who can or cannot participate in Bitcoin. - Permissionless Innovation: Anyone can build on Bitcoin, create products, and enhance its ecosystem without seeking approval. - Free Market Dynamics: Bitcoin is intended to thrive in a competitive financial landscape, allowing individuals to choose monetary instruments that best suit their needs.
These principles mirror the libertarian belief in self-sovereignty, voluntary association, and an open market for ideas and innovation. However, Bitcoin maximalism, in its most radical form, has evolved into a gatekeeping force that runs counter to these tenets.
The Rise of Maximalist Dogma
Bitcoin maximalists argue that Bitcoin is the only valid cryptocurrency and that all alternatives (altcoins) are scams. While it is prudent to be skeptical of centralized, pre-mined tokens rife with manipulative schemes, the maximalist stance has hardened into an ideological purity test that excludes rather than embraces open discourse.
Here’s where maximalists stray from libertarian values:
- Exclusionary Attitudes Toward Developers & Innovators
- Libertarians celebrate innovation, yet maximalists ostracize developers exploring Layer 2 solutions, alternative blockchains, or privacy-enhancing technologies outside the Bitcoin stack.
-
This mirrors the top-down control of authoritarian structures rather than the open competition of free-market principles.
-
Hostility Toward Alternative Monetary Experiments
- Libertarians favor free competition in currencies, arguing that individuals should be able to choose what best serves their interests.
-
Maximalists, however, reject any competing monetary experiment, even those that could complement Bitcoin (e.g., sidechains, zero-knowledge rollups, or asset tokenization solutions).
-
Cult-Like Insistence on Absolute Adherence
- Many maximalists have adopted an aggressive, almost religious stance, enforcing ideological purity tests that reject even Bitcoin-related innovations if they don’t fit the maximalist mold.
-
Libertarianism, by contrast, is inherently pluralistic and tolerant of different approaches to achieving freedom.
-
Disregard for Financial Sovereignty of Others
- Bitcoin's ethos is to provide financial self-sovereignty, yet maximalists attack those who choose to hedge risks with other assets, whether it be Monero for privacy, stablecoins for short-term volatility resistance, or even tokenized representations of real-world assets.
- A true libertarian approach would acknowledge the right of individuals to freely navigate financial instruments that align with their preferences.
The Irony: Bitcoin Itself Benefits from Free Market Dynamics
Bitcoin did not emerge in a vacuum—it competed against previous iterations of digital money, such as e-gold, Liberty Reserve, and earlier cryptographic cash concepts. If the early cypherpunks had imposed the same dogmatic restrictions on monetary experimentation that maximalists advocate today, Bitcoin itself may never have had the chance to thrive.
Libertarianism doesn’t fear competition; it thrives on it. Bitcoin maximalists, in seeking to eliminate all perceived competition, unwittingly recreate the exclusivity and coercion they claim to oppose.
The Path Forward: A Truly Open Bitcoin Culture
To realign Bitcoin culture with its libertarian roots, the community must: 1. Embrace Open Competition – Allow Bitcoin to prove itself through the free market rather than through ideological suppression of alternatives. 2. Encourage Innovation – Welcome new technologies, even if they originate outside Bitcoin, as long as they align with the ethos of decentralization and financial freedom. 3. Respect Individual Choice – Bitcoiners should recognize that financial sovereignty includes the right to explore different economic tools without facing tribalistic attacks.
Bitcoin was never meant to be an exclusive club—it was designed as an open financial revolution. To honor its founding principles, the community must resist the urge to impose ideological purity tests and instead foster the spirit of liberty, innovation, and voluntary association that made Bitcoin possible in the first place.
-
@ 000002de:c05780a7
2025-01-30 21:17:26The Debian Publicity Team will no longer post on X/Twitter. We took this decision since we feel X doesn't reflect Debian shared values as stated in our social contract, code of conduct and diversity statement. X evolved into a place where people we care about don't feel safe.
A couple red flags in this post that explain their actions.
- Shared values - projects that have broad values statements are prone to isolation over time
- Social contract - that's a meaningless vapid term
I have no issue with code of conduct guidelines or having value statements but when you pick sides on cultural divides and things that are not at all related to the logical objective of a project you are going to end up where Debian has landed.
X has its issues, I'm not a fan but the reasoning behind this seems really off.
One Debian user responded with what I thought was a good summary of why this is a bad move.
I'm a long-time Debian user and fan, and am also one of the champions for using Debian in space-based applications at NASA.
IMO this is a short-sighted and foolish decision. The notion of "values" is bring sadly misapplied here.
I urge you to reconsider. More channels of communication, even with those whom you disagree with, is good for both Debian and your user community.
I'm not into the "anti-woke" or "woke" crap and I dare say most people that use Linux do not care about either side very much at all. A loud minority has been gaining power in these types of projects for a long time. Today we have very loud counters to that group that also can be annoying and out of line.
Will be interesting to watch this all unfold over the next few years. Conservatives seem to be running victory laps and I think that's not only premature but also counter-productive.
I can see leaving X for other reasons.
- Debian users are really using it to communicate with the project
- The Debian publicity team isn't seeing very much of a response for their efforts
- X has become more about politics than tech and communication
- Specific examples of how X is causing issues for the project
They do say this
X evolved into a place where people we care about don't feel safe.
That's too bad but honestly I don't buy it. Maybe I don't spend enough time on X to have much credibility on this but I'm skeptical of this being the case.
originally posted at https://stacker.news/items/870437
-
@ 1cb14ab3:95d52462
2025-01-30 18:45:41
Other Photo Series by Hes:
More from Hes:
All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from these photos, please feel free to send a zap. Enjoy life on a Bitcoin standard.
-
@ cc8d072e:a6a026cb
2025-01-30 17:20:24Recently, I had the opportunity to work as an advisor for an AI agent project, which is created by team with a lot of fin-tech software develop experience. As we coded together, their real-time questions and challenges provided unique insights into the hurdles software engineers face when transitioning to AI development. They would pause at moments that most AI engineers take for granted - "How can we be sure the agent understood correctly?", "What if the model makes a mistake?", "How do we handle the uncertainty?" These weren't just isolated questions; they represented the fundamental paradigm shift required when moving from traditional software engineering to AI development. And thats why i think it might be worthy to take sometime write down this article and if you are going to start your first AI agent programming, spending 5 min reading t his will save you a lot of time later.
1. Shifting from Deterministic to Probabilistic Thinking
- Traditional software engineering deals with deterministic outcomes
- AI systems operate on probability rather than certainty
- Engineers need to adapt from "100% correct" mindset to accepting probabilistic outcomes
- Blockchain developers may find this particularly challenging due to their background in exact, deterministic systems
2. Understanding Core AI Concepts
(There are a lot of concepts to understand, but i will focus on the most frequently asked ones)
Memory Management
- Short-term Memory: Implemented through conversation context
- Long-term Memory: Implemented through vector databases (RAG - Retrieval Augmented Generation)
- Context length management is crucial due to LLM token limitations
Language Models and Fine-tuning
- Base models (like GPT) provide general intelligence
- Domain-specific knowledge can be added through:
- Fine-tuning with custom datasets
- Adding RAG layers for specific knowledge domains
3. Technical Framework Knowledge
Essential Tools and Frameworks
- Vercel AI SDK (if you are a typescript guy)
- LangChain (alternative option)
- Different models(openai, claude, gemini, etc, of course, now, deepseek. the temu in llm )
- Understanding of prompt engineering
Multi-Agent Systems
- Agents can communicate through natural language
- Inter-agent communication requires careful system design
- Implementation of thought processes and decision-making loops
- Safety considerations for system commands and operations
4. Language and Localization Considerations
- System prompts typically work best in English
- Multi-language support requires careful handling:
- Input translation to English
- Processing in English
- Output translation to target language
- Model performance varies across different languages
5. Safety and Error Handling
- Implementing validation layers for critical operations
- Understanding model limitations and potential errors
- Building feedback mechanisms to detect misunderstandings
Conclusion
Transitioning from software engineering to AI engineering requires a significant mindset shift. While traditional software engineering skills remain valuable, understanding probabilistic systems, language models, and AI-specific architectures is crucial. The key is to balance innovation with practical safety considerations, especially when dealing with critical applications.
Remember that AI systems are not perfect, and building robust applications requires careful consideration of their limitations and appropriate safety measures. Start with existing frameworks and gradually build up complexity as you become more comfortable with AI-specific concepts and challenges.(the conclusion part is written by chatgpt, did you notice? :))
-
@ 97c70a44:ad98e322
2025-01-30 17:15:37There was a slight dust up recently over a website someone runs removing a listing for an app someone built based on entirely arbitrary criteria. I'm not to going to attempt to speak for either wounded party, but I would like to share my own personal definition for what constitutes a "nostr app" in an effort to help clarify what might be an otherwise confusing and opaque purity test.
In this post, I will be committing the "no true Scotsman" fallacy, in which I start with the most liberal definition I can come up with, and gradually refine it until all that is left is the purest, gleamingest, most imaginary and unattainable nostr app imaginable. As I write this, I wonder if anything built yet will actually qualify. In any case, here we go.
It uses nostr
The lowest bar for what a "nostr app" might be is an app ("application" - i.e. software, not necessarily a native app of any kind) that has some nostr-specific code in it, but which doesn't take any advantage of what makes nostr distinctive as a protocol.
Examples might include a scraper of some kind which fulfills its charter by fetching data from relays (regardless of whether it validates or retains signatures). Another might be a regular web 2.0 app which provides an option to "log in with nostr" by requesting and storing the user's public key.
In either case, the fact that nostr is involved is entirely neutral. A scraper can scrape html, pdfs, jsonl, whatever data source - nostr relays are just another target. Likewise, a user's key in this scenario is treated merely as an opaque identifier, with no appreciation for the super powers it brings along.
In most cases, this kind of app only exists as a marketing ploy, or less cynically, because it wants to get in on the hype of being a "nostr app", without the developer quite understanding what that means, or having the budget to execute properly on the claim.
It leverages nostr
Some of you might be wondering, "isn't 'leverage' a synonym for 'use'?" And you would be right, but for one connotative difference. It's possible to "use" something improperly, but by definition leverage gives you a mechanical advantage that you wouldn't otherwise have. This is the second category of "nostr app".
This kind of app gets some benefit out of the nostr protocol and network, but in an entirely selfish fashion. The intention of this kind of app is not to augment the nostr network, but to augment its own UX by borrowing some nifty thing from the protocol without really contributing anything back.
Some examples might include:
- Using nostr signers to encrypt or sign data, and then store that data on a proprietary server.
- Using nostr relays as a kind of low-code backend, but using proprietary event payloads.
- Using nostr event kinds to represent data (why), but not leveraging the trustlessness that buys you.
An application in this category might even communicate to its users via nostr DMs - but this doesn't make it a "nostr app" any more than a website that emails you hot deals on herbal supplements is an "email app". These apps are purely parasitic on the nostr ecosystem.
In the long-term, that's not necessarily a bad thing. Email's ubiquity is self-reinforcing. But in the short term, this kind of "nostr app" can actually do damage to nostr's reputation by over-promising and under-delivering.
It complements nostr
Next up, we have apps that get some benefit out of nostr as above, but give back by providing a unique value proposition to nostr users as nostr users. This is a bit of a fine distinction, but for me this category is for apps which focus on solving problems that nostr isn't good at solving, leaving the nostr integration in a secondary or supporting role.
One example of this kind of app was Mutiny (RIP), which not only allowed users to sign in with nostr, but also pulled those users' social graphs so that users could send money to people they knew and trusted. Mutiny was doing a great job of leveraging nostr, as well as providing value to users with nostr identities - but it was still primarily a bitcoin wallet, not a "nostr app" in the purest sense.
Other examples are things like Nostr Nests and Zap.stream, whose core value proposition is streaming video or audio content. Both make great use of nostr identities, data formats, and relays, but they're primarily streaming apps. A good litmus test for things like this is: if you got rid of nostr, would it be the same product (even if inferior in certain ways)?
A similar category is infrastructure providers that benefit nostr by their existence (and may in fact be targeted explicitly at nostr users), but do things in a centralized, old-web way; for example: media hosts, DNS registrars, hosting providers, and CDNs.
To be clear here, I'm not casting aspersions (I don't even know what those are, or where to buy them). All the apps mentioned above use nostr to great effect, and are a real benefit to nostr users. But they are not True Scotsmen.
It embodies nostr
Ok, here we go. This is the crème de la crème, the top du top, the meilleur du meilleur, the bee's knees. The purest, holiest, most chaste category of nostr app out there. The apps which are, indeed, nostr indigitate.
This category of nostr app (see, no quotes this time) can be defined by the converse of the previous category. If nostr was removed from this type of application, would it be impossible to create the same product?
To tease this apart a bit, apps that leverage the technical aspects of nostr are dependent on nostr the protocol, while apps that benefit nostr exclusively via network effect are integrated into nostr the network. An app that does both things is working in symbiosis with nostr as a whole.
An app that embraces both nostr's protocol and its network becomes an organic extension of every other nostr app out there, multiplying both its competitive moat and its contribution to the ecosystem:
- In contrast to apps that only borrow from nostr on the technical level but continue to operate in their own silos, an application integrated into the nostr network comes pre-packaged with existing users, and is able to provide more value to those users because of other nostr products. On nostr, it's a good thing to advertise your competitors.
- In contrast to apps that only market themselves to nostr users without building out a deep integration on the protocol level, a deeply integrated app becomes an asset to every other nostr app by becoming an organic extension of them through interoperability. This results in increased traffic to the app as other developers and users refer people to it instead of solving their problem on their own. This is the "micro-apps" utopia we've all been waiting for.
Credible exit doesn't matter if there aren't alternative services. Interoperability is pointless if other applications don't offer something your app doesn't. Marketing to nostr users doesn't matter if you don't augment their agency as nostr users.
If I had to choose a single NIP that represents the mindset behind this kind of app, it would be NIP 89 A.K.A. "Recommended Application Handlers", which states:
Nostr's discoverability and transparent event interaction is one of its most interesting/novel mechanics. This NIP provides a simple way for clients to discover applications that handle events of a specific kind to ensure smooth cross-client and cross-kind interactions.
These handlers are the glue that holds nostr apps together. A single event, signed by the developer of an application (or by the application's own account) tells anyone who wants to know 1. what event kinds the app supports, 2. how to link to the app (if it's a client), and (if the pubkey also publishes a kind 10002), 3. which relays the app prefers.
As a sidenote, NIP 89 is currently focused more on clients, leaving DVMs, relays, signers, etc somewhat out in the cold. Updating 89 to include tailored listings for each kind of supporting app would be a huge improvement to the protocol. This, plus a good front end for navigating these listings (sorry nostrapp.link, close but no cigar) would obviate the evil centralized websites that curate apps based on arbitrary criteria.
Examples of this kind of app obviously include many kind 1 clients, as well as clients that attempt to bring the benefits of the nostr protocol and network to new use cases - whether long form content, video, image posts, music, emojis, recipes, project management, or any other "content type".
To drill down into one example, let's think for a moment about forms. What's so great about a forms app that is built on nostr? Well,
- There is a spec for forms and responses, which means that...
- Multiple clients can implement the same data format, allowing for credible exit and user choice, even of...
- Other products not focused on forms, which can still view, respond to, or embed forms, and which can send their users via NIP 89 to a client that does...
- Cryptographically sign forms and responses, which means they are self-authenticating and can be sent to...
- Multiple relays, which reduces the amount of trust necessary to be confident results haven't been deliberately "lost".
Show me a forms product that does all of those things, and isn't built on nostr. You can't, because it doesn't exist. Meanwhile, there are plenty of image hosts with APIs, streaming services, and bitcoin wallets which have basically the same levels of censorship resistance, interoperability, and network effect as if they weren't built on nostr.
It supports nostr
Notice I haven't said anything about whether relays, signers, blossom servers, software libraries, DVMs, and the accumulated addenda of the nostr ecosystem are nostr apps. Well, they are (usually).
This is the category of nostr app that gets none of the credit for doing all of the work. There's no question that they qualify as beautiful nostrcorns, because their value propositions are entirely meaningless outside of the context of nostr. Who needs a signer if you don't have a cryptographic identity you need to protect? DVMs are literally impossible to use without relays. How are you going to find the blossom server that will serve a given hash if you don't know which servers the publishing user has selected to store their content?
In addition to being entirely contextualized by nostr architecture, this type of nostr app is valuable because it does things "the nostr way". By that I mean that they don't simply try to replicate existing internet functionality into a nostr context; instead, they create entirely new ways of putting the basic building blocks of the internet back together.
A great example of this is how Nostr Connect, Nostr Wallet Connect, and DVMs all use relays as brokers, which allows service providers to avoid having to accept incoming network connections. This opens up really interesting possibilities all on its own.
So while I might hesitate to call many of these things "apps", they are certainly "nostr".
Appendix: it smells like a NINO
So, let's say you've created an app, but when you show it to people they politely smile, nod, and call it a NINO (Nostr In Name Only). What's a hacker to do? Well, here's your handy-dandy guide on how to wash that NINO stench off and Become a Nostr.
You app might be a NINO if:
- There's no NIP for your data format (or you're abusing NIP 78, 32, etc by inventing a sub-protocol inside an existing event kind)
- There's a NIP, but no one knows about it because it's in a text file on your hard drive (or buried in your project's repository)
- Your NIP imposes an incompatible/centralized/legacy web paradigm onto nostr
- Your NIP relies on trusted third (or first) parties
- There's only one implementation of your NIP (yours)
- Your core value proposition doesn't depend on relays, events, or nostr identities
- One or more relay urls are hard-coded into the source code
- Your app depends on a specific relay implementation to work (ahem, relay29)
- You don't validate event signatures
- You don't publish events to relays you don't control
- You don't read events from relays you don't control
- You use legacy web services to solve problems, rather than nostr-native solutions
- You use nostr-native solutions, but you've hardcoded their pubkeys or URLs into your app
- You don't use NIP 89 to discover clients and services
- You haven't published a NIP 89 listing for your app
- You don't leverage your users' web of trust for filtering out spam
- You don't respect your users' mute lists
- You try to "own" your users' data
Now let me just re-iterate - it's ok to be a NINO. We need NINOs, because nostr can't (and shouldn't) tackle every problem. You just need to decide whether your app, as a NINO, is actually contributing to the nostr ecosystem, or whether you're just using buzzwords to whitewash a legacy web software product.
If you're in the former camp, great! If you're in the latter, what are you waiting for? Only you can fix your NINO problem. And there are lots of ways to do this, depending on your own unique situation:
- Drop nostr support if it's not doing anyone any good. If you want to build a normal company and make some money, that's perfectly fine.
- Build out your nostr integration - start taking advantage of webs of trust, self-authenticating data, event handlers, etc.
- Work around the problem. Think you need a special relay feature for your app to work? Guess again. Consider encryption, AUTH, DVMs, or better data formats.
- Think your idea is a good one? Talk to other devs or open a PR to the nips repo. No one can adopt your NIP if they don't know about it.
- Keep going. It can sometimes be hard to distinguish a research project from a NINO. New ideas have to be built out before they can be fully appreciated.
- Listen to advice. Nostr developers are friendly and happy to help. If you're not sure why you're getting traction, ask!
I sincerely hope this article is useful for all of you out there in NINO land. Maybe this made you feel better about not passing the totally optional nostr app purity test. Or maybe it gave you some actionable next steps towards making a great NINON (Nostr In Not Only Name) app. In either case, GM and PV.
-
@ e83b66a8:b0526c2b
2025-01-30 16:11:24I have a deep love of China. It probably started in 1981, when my Father visited China on the first trade mission from the UK to open up trading between the 2 nations.
As a family, we have historically done a lot of business in Asia starting with our company Densitron, who’s Asian headquarters were in Tokyo, through to Taiwan where we had factories leading to investing in Vbest, now Evervision an LCD manufacturer. They have admin offices in Taiwan and a factory in Jiangsu, China.
I have always hated the western narrative that China is the “enemy” or that China’s Communist / Capitalist system is “evil”.
Without understanding history, geography, cultural biases, and indoctrination it is as difficult to remove those beliefs in the same way it is difficult to convert “normies” to understand the freedom and power of Bitcoin.
I have tried and had some success, but mostly failed.
However the recent ban on TikTok and the migration of the west to the Chinese owned “rednote” app has overnight created more cultural exchanges and understanding than the previous 40+ years has ever managed to achieve. That along with the recent disclosure about Chinas advancements in AI have also deflated some of the western hubris.
If you wish to go down the rabbit hole of China from a cultural view, this YouTuber has given me a much better framework than I could ever provide as an outsider.
She is a Chinese girl, who came to the UK to study at University only to return with a mixed understanding of both cultures. She is doing a far better job of explaining the culture from a western perspective than I ever could.
https://www.youtube.com/@SimingLan
Here are 4 videos of hers that help explain a lot:
This is a lighthearted look at the recent TikTok ban TikTok ban completely backfired on US! and it's been hilarious https://www.youtube.com/watch?v=A7123nG5otA
More in-depth insights are:
My complicated relationship with China. https://www.youtube.com/watch?v=BEaw0KAuNBU
China's Biggest Problem with Free Speech Rhetoric https://www.youtube.com/watch?v=V7eSyKPbg_Y
What the West Doesn't Get about China's Rise https://www.youtube.com/watch?v=hmb1_HfflCA
-
@ 8d5ba92c:c6c3ecd5
2025-01-30 15:58:03For me, it’s simple yet profound: a job and labor aren’t the same thing. You don’t have to struggle to perform a task or to meet someone else's unrealistic expectations. In fact, if you genuinely enjoy what you’re doing and believe in its purpose, the results will naturally be better—and everyone benefits.
I’m speaking from the perspective of someone who walked away from a "well-established career" multiple times. These days, I might be working more than ever, but I don’t feel tired, frustrated, or burned out. The radical change I made—leaving the "professional fiat world" behind—wasn’t easy, but I’ve never regretted it. Now, working fully in Bitcoin, I feel more motivated and satisfied than ever before.
Sure, it's not always straightforward.
This lifestyle definitely comes with its challenges. But those challenges don’t crush me. Just the opposite. When combined with a sense of freedom, they become opportunities for growth—something I truly value. It’s a completely different experience compared to most jobs rooted in the old system.
I’m not saying working in Bitcoin is all sunshine and rainbows, nor am I criticizing anyone still working in fiat. What I’m trying to emphasize is the core message of that quote:
Do what you love, and you’ll never work a day in your life...
Read it aloud and think about your last couple of jobs.
How did you feel? Did you find fulfillment and satisfaction, or was it more like a form of slavery that made you dread going to bed and waking up every morning?
I didn’t really have those feelings, except for one corporation at the beginning of my career, which gave me a hard time but also taught me valuable lessons. Aside from that experience, most of my jobs weren’t too bad—no need to complain. Still, I often questioned my situation: 'Seriously, why do I have to do this or that if I know it doesn’t make sense?'
Doing things you don’t believe in can lead to frustration, often in ways you might not even realize, yet every time, significantly affecting your well-being and the people around you.
Now, I hardly know what inner anger means.
I wake up happy, full of passion and ideas. I don’t track the hours as they pass; instead, I focus on all the tasks I complete and how they make a difference for me and others. Yes, I love what I do. And returning to the main point of this article, I shouldn’t even see it as work, even though in practice it definitely is.
The key here is a mix of independence, purpose, and self-determination. Bitcoin has helped me achieve that to a level that’s hard to break.
A Fresh Take on The Market
I also remember that 5-7 years ago, especially for non-devs, Bitcoin-based jobs weren’t as accessible as they are now (which is probably why I stayed in my traditional career for so long...). It’s really only in the last, maybe 2-3 years that things have changed. With so many areas expanding beyond just mining and tech-related stuff, and new interesting projects popping up regularly, there’s almost any position you can imagine to jump into.
According to a recent report by Bitvocation '69% of Bitcoin jobs are non-developer roles'. Also, more than half of available positions in 2024 offered remote opportunities, giving job seekers extra flexibility. Bitcoin is borderless—and so are many of the jobs in this space. If you’ve ever thought working in Bitcoin was out of reach, think again—and check this out "BITCOIN JOB MARKET DATA, 2024 Report".
One tip from my experience: a good option is to start with a part-time role while keeping your traditional fiat job for more stability, especially at the beginning. After a while, you’ll gain more confidence and see which direction you want to go. Or, if you position yourself so that you don’t need to earn a lot for the next 3-6 months, consider finding a project- or task-based Bitcoin job, maybe even just an internship. Meanwhile, you might decide to focus on building something unique on your own. It can feel amazing! You’ll gain valuable skills, sharpen your experience, and better understand which options work best for your future.
You see, just like in nature, balance is key. You don’t have to run before you can walk.
What I’m saying is this:
The choice is yours, as long as you plan ahead + learn, while staying true to your needs, beliefs, and priorities.
If you want it, do it. Starting a career in Bitcoin is possible, and I have a feeling this space will grow even faster in the next few years. Yes, there will still be ups and downs (hello, bear markets!), but if you plan thoughtfully, there’s not much to worry about.
We’re still early—Bitcoin is only 16 years old—but if you’ve been following this space, you’ve probably seen how dynamic and resilient it is. If you’ve ever thought about working in Bitcoin, now is the time to rethink the possibilities :)))
BTC Your Mind. Let it Beat.
Şelale
-
@ f1989a96:bcaaf2c1
2025-01-30 15:25:34Good morning, readers!
This week, authoritarian regimes augmented their control and monitoring of online spaces in an attempt to suppress the dissenting voices of those they have financially repressed. While Pakistanis grapple with the highest cost of living in Asia, the military-backed regime passed an oppressive social media bill that empowers the government to imprison and fine individuals deemed to be spreading “disinformation” online.\ \ Meanwhile, in Belarus, authoritarian Alexander Lukashenko secured a seventh term in an openly rigged presidential election, further consolidating his grip on power and deepening the country’s political and financial repression. This prolongs his rule beyond three decades, cementing him as the sole ruler of Belarus since the country gained independence from the Soviet Union in 1991.
In freedom technology news, open-source developer Super Testnet released a new privacy tool called Hurricash. It lets multiple users lock funds together in a single Bitcoin Unspent Transaction Output (UTXO), allowing them to transact within the pool of users with greater privacy and efficiency. With greater liquidity and adoption, it could prove a useful tool for human rights activists seeking financial privacy. \ \ Additionally, Zaprite integrated BTCPay Server, enabling users to accept Bitcoin, Lightning, and fiat payments using self-custodial and self-hosted Bitcoin infrastructure. This is particularly valuable for nonprofits and activists in authoritarian regimes, where governments monitor and restrict financial activity.
We end with the latest episode of the “Money Matters” podcast, where Jack Mallers, CEO of Strike, interviews HRF Chief Strategy Officer Alex Gladstein to discuss the often overlooked connection between Bitcoin and financial freedom.
Now, let’s jump right in!
Subscribe Here
GLOBAL NEWS
Belarus | Lukashenko Sweeps Openly Rigged Election Amid Financial Repression
In Belarus, authoritarian leader Alexander Lukashenko secured a seventh term in an openly rigged presidential election. Lukashenko’s crusade against dissent and political opposition has left many citizens and opposition figures exiled, imprisoned, and financially repressed. Historically, his regime has frozen bank accounts, blocked foreign currency exchanges, and cut off independent media from funding. By wielding financial and political power, Lukashenko ensures that no real opposition can rise, turning Belarus into a country where even the illusion of democracy has disappeared. In these environments, Bitcoin and tools like Lnp2pbot (an HRF grantee) help Belarusians circumvent financial restrictions and transact in a currency that Lukashenko can’t control.
Nigeria | Joins BRICS Economic Coalition
Nigeria is expanding its financial repression both internationally and domestically. It recently joined BRICS, an intergovernmental economic organization led by the Chinese and Russian regimes. For some, this raises concerns as Nigeria may deepen its authoritarian ways and further restrict individual financial freedoms. Member countries are each leaders in the development and implementation of central bank digital currencies (CBDCs), threatening individual financial autonomy as financial control is increasingly placed under the purview of authoritarian states. In parallel, the Nigerian regime plans to distribute a 75,000 naira ($48) “cash transfer” to the nation’s poorest citizens. This bid to alleviate poverty risks, while stoking inflation and compromising privacy, as the initiative relies on digital registration through the National Identity Number (NIN) system. Nigeria’s strategy of using both micro and macro financial controls limits open markets and curtails individual freedoms.
Pakistan | Regime Passes Repressive Bill Targeting Online Spaces
Pakistan’s military-backed regime passed a repressive social media bill that allows officials to imprison citizens for spreading “disinformation” online. Under this new law, officials can block “unlawful and offensive” content and remove users from social media at a time when Pakistanis are increasingly turning to online spaces to express discontent over regime-imposed economic hardships. Those “spreading disinformation” risk facing three years in prison and fines of up to 2 million rupees ($7,150) — a harsh penalty for citizens grappling with the highest cost of living on the continent. Further, social platforms must register with the Social Media Protection and Regulatory Authority to operate or risk a permanent ban. Censorship and Internet controls are sadly nothing new for Pakistanis since the regime has blocked X during elections and enacted a nationwide Internet firewall to suppress public discourse and action.
Cuba | Salary of Baseball Player Buys a Carton of Eggs
Cuba’s cost-of-living crisis is so severe that even the country’s top and most profitable athletes cannot make ends meet. Exemplifying this, the monthly salary of a professional baseball player in the National Series — Cuba’s premier sporting event — barely covers the cost of a carton of eggs, forcing them to seek opportunities elsewhere. With the Cuban peso in freefall, several players have resigned, citing financial hardships as the reason for leaving the sport they love. Their departures reflect a broader reality: wages across Cuba fail to keep pace with severe inflation caused by the Cuban regime’s continuous economic mismanagement. The state continues to enforce wages in the collapsing peso while requiring “MLC” credits to purchase high-quality food and goods in a system that pulls in foreign exchange from abroad while stealing from citizens at home.
South Sudan | Regime Blocks Citizen Access to Social Media
In South Sudan, rebel leader Salva Kiir Mayardit directed the National Communication Authority (NCA) to block each citizen’s access to social media nationwide for up to three months, citing concerns over “public safety” and “mental health.” This decision follows violent videos of Sudanese armed forces attacking South Sudanese refugees in Sudan. Sudanese rights groups condemned the ban as a blatant act of censorship and an abuse of power. “The death of our South Sudanese in Sudan should not culminate in blocking social media, which is one of the ways many of us get information,” said one Sudanese citizen. By restricting social media, the regime demonstrates a clear willingness to silence dissent, suppress information, and stifle transparency under the guise of “protection.” As Sudanese grapple with rising prices, the ban further isolates them, leaving little room to coordinate relief efforts, share grievances, or hold those in power accountable.
RECOMMENDED CONTENT
IMF Offers a Glimpse at the Perils of Central Bank Digital Currencies by J.D. Tuccille
In this article for Reason Magazine, J.D. Tuccille examines the dangers of central bank digital currencies (CBDCs) and their implications for financial independence and privacy. Drawing from the International Monetary Fund’s (IMF) “CBDC Virtual Handbook,” Tuccille explains how CBDCs grant governments unprecedented control to monitor transactions, impose restrictions, and manipulate financial behavior. He contrasts these state-issued digital currencies with decentralized alternatives like Bitcoin, highlighting the stark differences in privacy and user freedom. You can read the complete analysis here. To learn more about CBDCs and the threats they pose to civil liberties and human rights, check out our HRF’s CBDC Tracker.
BITCOIN AND FREEDOM TECH NEWS
Super Testnet | Launches Hurricash
Bitcoin Developer Super Testnet released Hurricash, an experimental and open-source Bitcoin privacy protocol. Hurricash lets multiple users lock funds together in a single Bitcoin Unspent Transaction Output (UTXO), making their transactions more private. Users can then transact within the pool with greater efficiency and privacy. With greater liquidity and adoption, it could prove a useful tool for human rights defenders seeking financial privacy. Innovations like this could also pave the way for activists in many decades to afford trustless BTC transactions.
Zaprite | Integrates BTCPay Server
Zaprite, a platform for accepting Bitcoin payments, recently integrated BTCPay Server, an open-source Bitcoin payment processor and HRF grantee. This integration allows users to accept Bitcoin, Lightning, and fiat payments (like USD) while maintaining full control over their funds — something Zaprite couldn’t afford on its own. By connecting with BTCPay Server, users can receive Bitcoin payments directly to their own self-hosted wallet and node, reducing censorship risks and enhancing financial independence. This is valuable for nonprofits, merchants, and activists in authoritarian regimes, where governments monitor, freeze, and restrict financial activity.
Breez SDK | Implements Pay to BIP 353 Addresses
The Breez Software Development Kit (SDK), a tool for integrating self-custodial Lightning payments into apps and services, now supports payments to BIP 353 addresses. BIP 353 enables individuals with access to a domain the ability to create static, human-readable payment addresses (such as user@domain), instead of a long string of letters and numbers. This means an activist with a website can receive Bitcoin donations directly through their domain — if their wallet supports BIP 353. Several Bitcoin wallets already using the Breez SDK include Cake Wallet, Blitz Wallet, and Klever Wallet. These static addresses make receiving Bitcoin easier, more private, and more censorship resistant, reducing surveillance risks and simplifying recurring payments.
Ark Labs | Releases Wallet Software Development Kit
Ark, a protocol promising faster and cheaper transactions on Bitcoin, released a wallet software development kit (SDK). The SDK is aimed at helping developers more readily create Ark-compatible Bitcoin wallets that support both traditional Bitcoin payments and Ark’s instant transactions on mobile and desktop platforms. Protocols like Ark hold promise for greater transaction efficiency and improve its transaction capabilities for those who need it most.
Tornado Cash | US District Court Reverses Sanctions
A United States District Court ruled to reverse the sanctions on Tornado Cash, marking a major legal win for financial privacy in the digital asset space. This decision follows a previous Appeals Court ruling that found the Treasury overstepped its authority by sentencing the digital asset mixer under the International Emergency Economic Powers Act (IEEPA). The court determined that Tornado Cash’s smart contracts (self-executing lines of code) do not constitute “property,” making them ineligible for sanctions under existing laws. These rulings set a positive precedent for decentralized protocols and financial privacy in a world where these tools are desperately needed. Developers cannot work on privacy openly in dictatorships, so they need havens in liberal democracies.
OpenSats | Announces Grants for Three Bitcoin Core Contributors
OpenSats, a public nonprofit supporting open-source software and projects, announced three new grants for Bitcoin Core contributors L0rinc, kevkevin, and Daniela Brozzoni. L0rinc will improve Bitcoin Core's performance and reliability by optimizing Initial Block Download (IBD), block storage, and database functionality. Kevkevin will enhance Bitcoin Core's stability, security, and usability by fixing bugs and reviewing pull requests. Finally, Daniela will review Bitcoin Core's code, adding features and improving test coverage. HRF is pleased to see the continued support of open-source developers from this Bitcoin Development Fund grantee.
Bitcoin Chiang Mai | Bitcoin for Human Rights Meetup
Bitcoin Chiang Mai, a grassroots Bitcoin community in Thailand, will host a meetup exploring Bitcoin’s role in human rights and financial freedom on Feb. 7, 2025. HRF Global Bitcoin Adoption Fellow Win Ko Ko Aung will discuss how Bitcoin empowers activists and communities under authoritarian rule, with a particular focus on Burmese citizens. Held in Burmese and English, the event will educate attendees on Bitcoin as a tool for escaping financial repression. If you have Burmese friends in Chiang Mai, share this opportunity with them. You can register here.
RECOMMENDED CONTENT
Bitcoin and Freedom with Alex Gladstein
In a special episode of the “Money Matters” podcast, Jack Mallers, CEO of Strike, speaks with Alex Gladstein, chief strategy officer at HRF, to discuss the powerful link between Bitcoin and financial freedom. Gladstein unpacks how authoritarian regimes manipulate money to control the public and explains why open-source financial tools are critical for resisting oppression. His insights make a compelling case for financial sovereignty as a fundamental human right — and why Bitcoin remains the most effective tool to secure it.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
-
@ ea30c5a8:f76a0295
2025-01-30 21:59:17i guess this is wotking correctly?
-
@ d57360cb:4fe7d935
2025-01-30 15:15:15Your mind is alot like a train. The Passengers on the train are your thoughts.
Most of us have way too many passengers, and an endless amount of passengers waiting to get on the ride.
If we don’t take a stop to let some of the passengers off, the train will get over crowded leaving no room for new passengers to board.
Alan Watts once said ““A person who thinks all the time has nothing to think about except thoughts. So, he loses touch with reality and lives in a world of illusions.”
Take some time daily if only for ten minutes to sit quietly and do nothing.
Let your mind rest, let it offload some passengers. You’d be surprised what you let go of and discover by taking a timeout.
-
@ ea30c5a8:f76a0295
2025-01-30 21:58:25whats up yall doing some more testing using nostrmo, amber, citrine, pokey on my shitty android.
-
@ cbd2779f:72a5b029
2025-01-30 15:08:13Have a few questions pertaining to setting up a new node. Basically, I always seems to be unsure about syncing to graph, after syncing to chain. Consider setting up a new node from scratch, or migrating perhaps, and you want to do an initial setup.
- How long does it take?
- What factors determine how long it takes?
- Is the graph a universal graph that is identical from each nodes perspective?
So far, I'm monitoring progress but tailing logs, looking for clues:
tail -n 100 /data/lnd/logs/bitcoin/mainnet/lnd.log | grep GRPH
I can find some relevant clues like:
2025-01-30 15:24:54.843 [INF] GRPH: Processed channels=56 updates=59 nodes=15 in last 59.823699481s
and then checking with:
lncli getinfo | grep -E 'synced|peers
which outputs"num_peers": 3, "synced_to_chain": true, "synced_to_graph": false,
At the moment, I've been experimenting with pruned blockchains and this outputs a lot of errors (I believe) relating to not being able to verify UTXOs as I have `ignore-historical-gossip-filters set to true.
Any further suggestions on how to better make sure things are happening under the hood when setting up a new node, what to look for in the logs or how to know the verification progress?
originally posted at https://stacker.news/items/869944